Denial-of-Service Flaw in WordPress
A serious application level denial-of-service (DoS) vulnerability has been discovered in the WordPress CMS platform that potentially can take down most WordPress websites without the need of attacking with a massive amount of bandwidth, as usually required in DoS attacks.
Since WordPress itself did not provide (to date) a patch, the vulnerability (CVE-2018-6389) remains and has an affect on most versions of WordPress including WordPress version 4.9.2 which is its most stable and latest release.
The vulnerability resides in the way “load-scripts.php” processes user-defined requests.
The file load-scripts.php was designed for admin users in order to improve performance and load pages faster which is done by combining multiple JavaScript files into a single request.
Apparently, WordPress developers did not create authentication for requesting the file before logging into the admin section, which makes the feature accessible to the entire world! đ
If you access your unpatched WordPress site via the following URL you will see the vulnerability in action (a bunch of JS files separated by commas):
https://unpatched-wordpress.com/wp-admin/load-scripts.php?c=1&load=editor,common,user-profile,media-widgets,media-gallery
The attacker can force âload-scripts.phpâ to call all of the existing JavaScript files by a single request through passing their names into the example URL. This action will cause a slow growth of CPU and memory consumption on the server.
A single request might not be enough for most servers, but if large amounts of concurrent requests are made to the same URL it might take the server down.
The company running WordPress says that this vulnerability should get mitigated at the server end and not on the application level. This leaves WordPress website owners that donât have Anti DDoS protection having to deal with it themselves.
In order to fix it by yourself you should have SSH access to your WordPress base directory, download the following script and run it: wp-dos-patch.sh
If you donât have SSH access to the servers, you should ask your hosting provider to run it for you.
In any case, make sure that you have a complete backup of your website before applying the script. With JetBackup you can also create a DR Clone just incase something goes wrong and you need a quick recovery of your website.
Start your FREE trial
of Jetbackup Today!
Get Started Now!
No credit card required.
Install Jetbackup in minutes.
Latest Posts
Categories
Archive
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- May 2024
- April 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- August 2023
- July 2023
- April 2023
- January 2023
- August 2022
- May 2022
- March 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- March 2021
- February 2021
- January 2021
- December 2020
- October 2020
- August 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2019
- August 2019
- July 2019
- June 2019
- April 2019
- March 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017