Researcher is going public with WordPress CSP bypass hack

John Leyden

01 June 2022 at 16:40 UTC

Up to date: 02 June 2022 at 10:00 UTC

Method skirts internet safety controls

A safety researcher has found out a neat, albeit in part advanced, solution to bypass CSP (Content material Safety Coverage) controls the use of WordPress.

The hack, found out via safety researcher Paulos Yibelo, depends upon abusing similar starting place means execution.

This method makes use of JSON padding to name a serve as. That’s this kind of factor that may permit the compromise of a WordPress account however simplest with the addition of a cross-site scripting (XSS) exploit, which the researcher doesn’t have as but.

Meet up with the most recent WordPress comparable safety information

Yibelo instructed The Day by day Swig that they’ve now not long past so far as making an attempt the trick on are living websites, limiting exploits to a check analysis website they themselves owned.

“I haven’t truly tried to as it calls for a logged in WordPress consumer or admin to seek advice from my website online, so I set up the plugin and feature a HTML injection – which is prohibited to do,” Yibelo defined, including they hadn’t tried to take advantage of the computer virus within the wild on computer virus bounty websites both.

The researcher added that they reported it to WordPress 3 months in the past by means of HackerOne. After failing to get a answer, Yibelo went public with the findings thru a technical weblog put up.

Endpoint endgame

Assaults are doubtlessly conceivable in two eventualities: 1) internet sites that don’t use WordPress without delay however have an endpoint of WordPress at the same-domain or subdomain, and a pair of) a website online hosted on WordPress with a CSP header.

The possible have an effect on is critical, as Yibelo’s weblog put up explains:

If an attacker unearths an HTML injection vulnerability inside the primary area (ex: website1.com – now not WordPress,) the use of this vulnerability, they are able to use a WordPress endpoint to improve a needless HTML Injection to a complete blown XSS that may be escalated to accomplish [remote code execution] RCE. This implies having WordPress any place at the website defeats the aim of getting a protected CSP.

The Day by day Swig invited WordPress’s core construction crew to remark at the analysis. No phrase again, as but, however we’ll replace this tale as and after we pay attention extra.

Yibelo concluded: “I’m hoping WordPress fixes it so CSP remains related on websites that host a WordPress endpoint.”

Content material Safety Coverage is a era set via internet sites and utilized by browsers that may block exterior sources and save you XSS assaults.

YOU MAY ALSO LIKE WordPress theme Jupiter patches essential safety hollow


https://portswigger.web/daily-swig/researcher-goes-public-with-wordpress-csp-bypass-hack

Previous PostNextNext Post