Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
71 views16 pages

Web Defacing Attacks Targeting WordPress

This document analyzes a WordPress plugin vulnerability that was exploited to deface over 18,000 websites. The attacker used a proof-of-concept to send malicious code to the "Slider Revolution" plugin via an AJAX request, overwriting the CSS file. When users accessed a crafted URL, the compromised CSS code was returned. Effective countermeasures include updating the plugin, limiting access to admin pages, and disabling the vulnerable AJAX function. Many defacement attacks target popular plugins by exploiting administrator functions without authentication. Properly securing admin access is important for mitigating these risks.

Uploaded by

cko09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views16 pages

Web Defacing Attacks Targeting WordPress

This document analyzes a WordPress plugin vulnerability that was exploited to deface over 18,000 websites. The attacker used a proof-of-concept to send malicious code to the "Slider Revolution" plugin via an AJAX request, overwriting the CSS file. When users accessed a crafted URL, the compromised CSS code was returned. Effective countermeasures include updating the plugin, limiting access to admin pages, and disabling the vulnerable AJAX function. Many defacement attacks target popular plugins by exploiting administrator functions without authentication. Properly securing admin access is important for mitigating these risks.

Uploaded by

cko09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

FFRI,Inc.

Monthly Research
Web defacing attacks targeting WordPress

株式会社FFRI
http://www.ffri.jp

Ver 1.00.02

1
FFRI,Inc.

Introduction
• To infect with malware was main stream of web defacing
attacks. But now We look again defacing for political claims or
showing off the height of the technical capabilities.
• Among them, Has been an increase in attack to deface with the
indiscriminate large number of web sites will be exploited a
vulnerability of popular product not set a clear target.
– In July 2014 50,000 web sites defaced by exploiting the
plugin's vulnerability of WordPress that easily can be deliver
the mail magazine "MailPoet Newsletters".
– http://www.pcworld.com/article/2458080/thousands-of-
sites-compromised-through-wordpress-plugin-
vulnerability.html
• We can find many attacks targeting vulnerabilities in external
plug-in of CMS.
• In this report show you the attack targeted WordPress's plug-in.
2
FFRI,Inc.

Situation of damage
• We can't measure all attacks. So we research the information
about an attacker who named "Index Php" posted to
"www.zone-h.org".

• At least 1,200 or more web sites including Japan's domain


became the victim in 24 hours from April 6, 2015 to 7.

• This attack has occurred from around 2015 the end of March.
And least 18,000 or more web sites have the victims.

• This attack doesn't edit the page file like "index.php" in server.
When you have access to a specific URI it shows us the
message that injected by attacker.

3
FFRI,Inc.

Attack analysis
• Attacker shows us url that proof the attack is success like this.
「http://target.com/wp-admin/admin-
ajax.php?action=revslider_ajax_action&client_action=get_captio
ns_css」

• We estimated target was WordPress because it included "wp-


admin"
• We estimated that this url requested to "Slider Revolution"
that popular plug-in of WordPress.
Because it included "admin-ajax.php" and
"action=revslider_ajax_action".
• And we can find "client_action=get_captions_css".

4
FFRI,Inc.

Attack analysis
• We got the custom PoC that used by a real attacker from
researching Prev Slide 's information and the time of
emergence of attack and defacer who using this attack
technique.

• General PoC published on Pastbin etc.

5
FFRI,Inc.

Attack analysis
• This PoC send POST request to “admin-ajax.php” like this.

$post = array?>
(
"action" => "revslider_ajax_action",
"client_action" => "update_captions_css",
"data" => "<marquee>Malicious Code Here</marquee>"
);

6
FFRI,Inc.

Attack analysis
• Then, Look at the “Slider Revolution” side code.
We found the code like this in “revslider_admin.php”.
232. $action = self::getPostGetVar("client_action");
233. $data = self::getPostGetVar("data");
...
301. case "get_captions_css":
302. $contentCSS = $operations->getCaptionsContent();
303. self::ajaxResponseData($contentCSS);
...
305. case "update_captions_css":
306. $arrCaptions = $operations->updateCaptionsContentData($data);
307. self::ajaxResponseSuccess("CSS file saved
succesfully!",array("arrCaptions"=>$arrCaptions));

7
FFRI,Inc.

Attack analysis
• Prev Slide said to us
– Call the "get_captions_css" or "update_captions_css" from
the value of has been POST "client_action".
– If you specify a "get_captions_css", and returns a
response obtaining a previously prepared CSS file by Ajax.
– If you specify a "update_captions_css", and overwrites
the value of has been POST the CSS file that is prepared in
advance "data“.

• From these things, We understood it.


– First attacker calls "update_captions_css" for overwriting
the CSS file.
– Next, Attacker sends url that call "get_captions_css" to us.

8
FFRI,Inc.

Attack Flow
By sending a malformed POST request to "/wp-admin/admin-
ajax.php", to override the CSS file in the server.

Server p#id { color: #ff3300 }


p#id { font-size: 24px }

CSS file

http://target.com/wp-admin/admin-ajax.php
$post = array?>
(
"action" => "revslider_ajax_action",
"client_action" => "update_captions_css",
"data" => “<h1>TEST</h1>"
Attacker );

9
FFRI,Inc.

Attack Flow
When you access to the crafted URL to call the "get_captions_css",
CSS content An attacker who successfully overwrite is returned as a
response.

Server <h1>TEST</h>

CSS file

!?
http://target.com/wp-admin/admin-ajax.php?action=revslider_ajax_action
&amp;client_action=get_captions_css

TEST

User

10
FFRI,Inc.

Threat analysis
• In the PoC that we got it used "Google Dork" that be able to
find large number vulnerable server or web site using Google's
search syntax.
• It is able to target all indexed by google in the world.

• Google Hacking Database


– http://www.exploit-db.com/google-dorks/

11
FFRI,Inc.

Threat analysis
• From the above attack analysis can be considered as follows
threats.
– By injecting a malicious JavaScript, being stolen Cookie
information etc.

– A stepping stone attacks and the like DDOS attack in


JavaScript based.

– It’s step up to attack that escape the effects of same-origin


policy.

• DDoS’s one was here already.

12
FFRI,Inc.

Countermeasures
• Include the following as effective countermeasures
– Updating “Slider Revolution” to version 4.6.5.
– Limit of access to "/wp-admin" or "/admin" by editing
".htaccess" .
– Disable “update_captions_css”
– Enable auto update of plug-in or WordPress
– Delete unused plug-ins
• Updating plug-in's version is effective.
But, limiting of access is better than it.
Because, WordPress has many other vulnerabilities in
plug-ins or own functions.
• Also, It'll be not match "Google Dork" by adding these url to
"robots.txt".

13
FFRI,Inc.

Summary
• Large number web sites defacing for various purposes are
increasing.
– Many used technique within of the these attacks is targeting
a popular product or these plug-ins like WordPress.
• In this report, was analyses about vulnerability that made
18,000 websites victims by exploiting “Slider Revolution".
– The point different from general attacks like SQL injection is
that using normal function.

• Many of these vulnerabilities within of the CMS product are often


in where there are assume used by admin.
– So, Limit of access to "/wp-admin" or "/admin" by editing
".htaccess" is very important.

14
FFRI,Inc.

Bibliography
• 50,000 sites hacked through WordPress plug-in vulnerability
http://www.pcworld.com/article/2458080/thousands-of-sites-compromised-
through-wordpress-plugin-vulnerability.html

• Index Php | Zone-H.org


http://www.zone-h.org/archive/notifier=Index%20Php

• Wordpress Plugin Revolution Slider - Unrestricted File Upload


http://www.exploit4arab.net/exploits/1416

15
FFRI,Inc.

Contact Information
E-Mail : research—[email protected]
Twitter : @FFRI_Research

16

You might also like