SB2019072306 - Multiple vulnerabilities in in WPS Hide Login



SB2019072306 - Multiple vulnerabilities in in WPS Hide Login

Published: July 23, 2019

Security Bulletin ID SB2019072306
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists in the "/classes/plugin.php" file due to the function "wpmu_activate_signup()" is not declared yet. A remote attacker can trigger the hook “wps_hide_login_signup_enable” with the correct URL and disclose the path information on the system.


2) Improper Authentication (CVE-ID: N/A)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to insufficient authorization controls in the "/classes/plugins.php" file on 563 line. A remote attacker can modify the header “Referer” and add “wp-login.php”, send an empty POST request and gain unauthorized access to the application.

Line 563:

if ( strpos( $url, 'wp-login.php' ) !== false ) {



3) Improper Authentication (CVE-ID: N/A)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists in the "/classes/plugins.php" file when WooCommerce (+60% of WP e-commerce) is activated. A remote attacker can access the login page and gain unauthorized access to the application.

Example:
https://example.com?action=rp&key&login

4) Improper Authentication (CVE-ID: N/A)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to insufficient authorization controls in the "/classes/plugins.php" file. A remote attacker can access the login page if the param “adminhash” is present in the URL and gain unauthorized access to the application.

Example:
https://exemple.com/wp-admin/?adminhash=1

5) Improper Authentication (CVE-ID: N/A)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to insufficient authorization controls in the "/classes/plugins.php" file. A remote attacker can access the login page if the URL contains “action=confirmaction” and gain unauthorized access to the application.

Example:
https://example.com/wp-login.php?SECUPRESSaction=confirmaction


Remediation

Install update from vendor's website.