Popular WordPress ‘AMP for WP’ Plugin Vulnerable to Privilege Escalation Attacks

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

The ‘AMP for WP – Accelerated Mobile Pages’ plugin for WordPress is vulnerable to a privilege escalation attack. Updating the plugin to version ‘0.9.97.20’ fixes the flaw.

Background

Following the discovery of a critical vulnerability in the WP GDPR Compliance Plugin, another critical WordPress plugin vulnerability was discovered this week in the popular AMP for WP plugin by researchers at WebARX Security. The plugin adds support for Google Accelerated Mobile Pages (AMP), a mobile site acceleration tool, to any WordPress site that has it installed.

Older versions of the plugin are vulnerable to a privilege escalation flaw, which allows WordPress site users of any level to make administrative API calls.

Analysis

WordPress allows all users to make AJAX API calls to manage or invoke various functions they may need to manage their site. However, the older version of this plugin didn’t include a wpnonce check to verify account permissions of the currently logged in user, effectively opening admin API access to anyone with a login for a site.

Admin access for WordPress allows for ad placement, custom HTML, and manual WordPress plugin uploads. From an outsider attack perspective, basic or even guest users are now a potential vector for admin access.

Proof of Concept

Source: WebARX Security

Solution

An updated version of the plugin is available via automatic updates through WordPress. Users can also manually download the plugin update here.

Identifying affected systems

Plugin 101841 will detect any WordPress plugins that are out of date, which includes the AMP for WP plugin, but doesn’t reflect the criticality of this specific issue.

A list of Tenable plugins to identify this vulnerability will appear here as they’re released.

Get more information

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a free 60-day trial of Tenable.io Vulnerability Management.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
1594 Followers
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel