Multiple vulnerabilities in WordPress Database Reset plugin



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2020-7047
CVE-2020-7048
CWE-ID CWE-269
CWE-287
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Vulnerable software
WordPress Database Reset
Web applications / Modules and components for CMS

Vendor Chris Berthe

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper Privilege Management

EUVDB-ID: #VU24370

Risk: High

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2020-7047

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to the "wp_users" table does not check the user capabilities and lacks a security nonce. A remote user can send a specially crafted request, reset the "wp_users" table, drop all users from the user table and gain administrative privileges on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

WordPress Database Reset: 1.0 - 3.1

CPE2.3 External links

https://wordpress.org/plugins/wordpress-database-reset/#developers
https://wpvulndb.com/vulnerabilities/10028
https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Authentication

EUVDB-ID: #VU24371

Risk: High

CVSSv4.0: 7.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]

CVE-ID: CVE-2020-7048

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to missing capability checks or security nonces. A remote attacker can send a simple request and reset any table from the database to the initial WordPress set-up state.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

WordPress Database Reset: 1.0 - 3.1

CPE2.3 External links

https://wordpress.org/plugins/wordpress-database-reset/#developers
https://wpvulndb.com/vulnerabilities/10027
https://www.wordfence.com/blog/2020/01/easily-exploitable-vulnerabilities-patched-in-wp-database-reset-plugin/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###