#VU27671 Improper Authentication


Published: 2020-05-11

Vulnerability identifier: #VU27671

Vulnerability risk: Medium

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-287

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Ultimate Addons for Elementor
Web applications / Modules and components for CMS

Vendor: Brainstorm Force

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote attacker can create subscriber-level users, even if registration is disabled on a WordPress site.

Note: This vulnerability is being used in conjunction with a 0-day vulnerability in Elementor PRO (SB2020051118) and allows the Elementor Pro vulnerability to be exploited, even if the site does not have user registration enabled. 

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Ultimate Addons for Elementor: 1.1.0, 1.2.0, 1.2.1, 1.3.0, 1.3.1, 1.4.0, 1.5.0, 1.5.1, 1.6.0, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.8.0, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.9.0, 1.9.1, 1.9.2, 1.10.0, 1.10.1, 1.10.2, 1.11.0, 1.12.0, 1.12.1, 1.13.0, 1.13.1, 1.13.2, 1.14.0, 1.15.0, 1.16.0, 1.16.1, 1.16.2, 1.17.0, 1.17.1, 1.18.0, 1.19.0, 1.19.1, 1.19.2, 1.20.0, 1.20.1, 1.21.0, 1.21.1, 1.22.0, 1.22.0.1, 1.22.1, 1.23.0, 1.23.1, 1.24.0, 1.24.1

CPE

External links
http://wpvulndb.com/vulnerabilities/10215/
http://www.wordfence.com/blog/2020/05/combined-attack-on-elementor-pro-and-ultimate-addons-for-elementor-puts-1-million-sites-at-risk/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability