Popular Wordpress Plugin Leaves Sensitive Data In the Open 54
chicksdaddy writes in with a warning about a popular Wordpress plugin. "A security researcher is warning WordPress users that a popular plugin may leave sensitive information from their blog accessible from the public Internet with little more than a Google search. The researcher, Jason A. Donenfeld, who uses the handle 'zx2c4' posted a notice about the add-on, W3 Total Cache on the Full Disclosure security mailing list on Sunday, warning that many WordPress blogs that had added the plugin had directories of cached content that could be browsed by anyone with a web browser and the knowledge of where to look. The content of those directories could be downloaded, including directories containing sensitive data like password hashes, Donenfeld wrote. W3 Total Cache is described as a 'performance framework' that speeds up web sites that use the WordPress content management system by caching site content, speeding up page loads, downloads and the like. The plugin has been downloaded 1.39 million times and is used by sites including mashable.com and smashingmagazine.com, according to the WordPress web site."
hacked? (Score:1)
Re:hacked? (Score:5, Informative)
Re: (Score:2)
Re: (Score:3)
SEO people need to be drawn and quartered. Assholes do nothing but pollute the web for their own gain.
Re: (Score:1)
proof (as if it were needed) that this cache plugin isn't the only vulnerability in wordpress.
tfa site runs wordpress, site is hacked with some injected spam links, site posts article about (another) vulnerability in the very software they use. here's your sign
Rule #1 of the internet (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
is it connected to the internet 24/7?
Re: (Score:1)
3.4285714285714285714285714285714
Re: (Score:1)
Most modern calculators have a switch on the back for that these days.
Re: (Score:2)
Is there a hack that improves the abysmal screen resolution?
You said it! (Score:5, Insightful)
Re: (Score:3)
In 2012 Slashdot - your funny comments are moderated insightful!
Re: (Score:2)
But in this case one can't know if the moderators took the O.P. seriously or not - I'd bet that some of them did.
Re: (Score:2)
Remote Shell (Score:3, Funny)
WordPress is a remote shell that happens to also carry a blogging feature...
tempfix (Score:5, Informative)
Re: (Score:3)
Re:tempfix (not apache 2.4+) (Score:2)
If you use latest stable apache (and you should if you use SSL/TLS) those commands will raise an error.
You must use "Require all denied" if you don't have mod_access_compat installed & enabled.
No fucking shit (Score:2, Insightful)
"Popular Wordpress Plugin Leaves Sensitive Data In the Open"
This happens at least twice a week. Don't use Wordpress. Or if you have to use Wordpress, lock it the fuck down and don't install plugins.
Re: (Score:3)
Actually it has everything to do with the plugin not having proper defaults in it's installation.
There's no reason the plugin can't drop it's own .htaccess files and such.
WordPress plugin? (Score:3, Funny)
A wordpress plugin with security issues? Well, I never...
Password hashes? (Score:2)
All the WordPress installations I've dealt with (quite a few, it's part of my job) had users' password hashes stored in a MySQL database. I wonder why the W3 plugin is writing them to the file system in the first place?
Re: (Score:3)
Some more examples (Score:2)
We're STILL doing this? (Score:3)
It's (the end of) 2012, why the hell are people STILL putting their data stores in web-accessible directories below DocumentRoot?
I specifically made a conscious decision to set up my very first PHP application to store uploaded files and configuration files in an inaccessible folder way back in 2002 specifically to avoid bullshit like that, which seems to me it must have had been going on for long enough that I knew better back then as a noob fresh out of college.
Re: (Score:3)
It's (the end of) 2012, why the hell are people STILL putting their data stores in web-accessible directories below DocumentRoot?
For the same reason that people are still picking simple passwords. Because it's easy, and doing the right thing is less convenient.
Re: (Score:2)
just run 'chmod -R 777 ~' on your host - somehow this makes everything better!
Re: (Score:2)
> It's (the end of) 2012, why the hell are people STILL putting their data stores in web-accessible directories below DocumentRoot?
Because PHP.
Link in TFA is hacked. :D (Score:1)
wp-content (Score:1)
http://joesdumbblog.net/wp-admin/plugins/css/https.paypal.com.php [joesdumbblog.net]
Well, that's embarrassing... (Score:5, Informative)
Hi folks, I'm Jason, the guy who found this bug.
I feel kind of embarrassed this is on the front page. I like to think that I spend time doing cooler things [zx2c4.com] than reading PHP, let alone the source of random Wordpress plugins. My brother lives at the south pole and has a pretty damn cool blog about it [jeffreydonenfeld.com] (yay, more linkspam!), but the NASA satellite only flies overhead a few times a day, and bandwidth is pretty limited, so he asked me to help with some maintenance, and in the process I noticed this. But now the Intertubes have me pinned as a Wordpresser, alas. I guess that's just how it goes.
Anyway, my feeling on this is basically, to put it in /. terms -- "Random Wordpress plugin has gaping security hole... news at 11!" If you want a reasonably secure Wordpress rig, it's probably best to stick with plugins and themes put out by Automattic.
It wasn't mentioned in the linked article, so it's worth nothing here -- I think the best remediation, until W3 Edge releases a fix (he's on Christmas vacation now or something I think), is to either disable the plugin entirely, or, if that's not a possibility, just disable the object cache and database cache, and then empty all caches. Doing that should at least clear up this hole.
-- Jason
Re: (Score:2)
I haven't used WP in a long time, so I don't know precisely what Total Cache does nowadays, but it seems to me that the security hole you disclosed would only ever apply if object and/or query caching is turned on with the disk used as the persistent store.
If so, I'd like to stress that this is a horrific setup which doesn't scale at all. The initial WP object caching implementation functioned precisely the same way in the WP core. It got disabled by default almost immediately because the high amount of dis
Lol php (Score:1)