Opened 7 years ago
Closed 7 years ago
#44943 closed defect (bug) (duplicate)
Using component with Known Vulnerability - Unpatched WordPress leading to DoS
Reported by: |
|
Owned by: | |
---|---|---|---|
Milestone: | Priority: | normal | |
Severity: | normal | Version: | |
Component: | Script Loader | Keywords: | |
Focuses: | Cc: |
Description
I would like to report a vulnerability that is categorized under "A9:2017-Using Components with Known Vulnerabilities" and can lead to denial of service.
Please read the report , before marking as not valid because of DoS ( Note:- there has been no attempt made to DoS the freshbooks web application )
Vulnerability:- https://wordpress.org/ uses word press as a backend engine to run its web application and using CVE-2018-6389 an anonymous user can cause Denial of service. In this vulnerability an attacker will pass all the possible javascript library and the application tries to load all the functions and send it back in response. Passing a large list of js functions can consume lot processing to responed back and if done from various location/ips/browser tabs can lead to DoS. This attack can lead to generate upto 3mb size response per request.
Possible fixes:-
- change default "admin" directory name (Security through obscurity)
- or apply some password protection to /wp-admin/ url
Impact:-
DoS of the site and application server
Please find the attached screenshot demonstrating the PoC.
Reference:-
https://hackerone.com/reports/335177
https://baraktawily.blogspot.com/2018/02/how-to-dos-29-of-world-wide-websites.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
Note: - My intention was never to hamper this platform in any manner just wanted to report in a responsible way.
Attachments area
Attachments (1)
Change History (2)
#1
@
7 years ago
- Component changed from General to Script Loader
- Milestone Awaiting Review deleted
- Resolution set to duplicate
- Status changed from new to closed
Please read https://make.wordpress.org/core/handbook/testing/reporting-security-vulnerabilities/ and see #43308 for which this is a duplicate of.
screeshot of loaded js functions