IT Security: WordPress plug-in flaw puts over 1M websites at risk

  
The Jetpack vulnerability can be exploited to inject malicious code into comments
 
Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could expose their users to attacks.
 
Jetpack is a popular plug-in that offers free website optimization, management and security features. It was developed by Automattic, the company behind WordPress.com and the WordPress open-source project, and has over 1 million active installations.
 
Researchers from Web security firm Sucuri have found a stored cross-site scripting (XSS) vulnerability that affects all Jetpack releases since 2012, starting with version 2.0.
 
The issue is located in the Shortcode Embeds Jetpack module which allows users to embed external videos, images, documents, tweets and other resources into their content. It can be easily exploited to inject malicious JavaScript code into comments.
 
Since the JavaScript code is persistent, it will get executed in users’ browsers in the context of the affected website every time they view the malicious comment. This can be used to steal their authentication cookies, including the administrator’s session; to redirect visitors to exploits, or to inject search engine optimization (SEO) spam.
 
The vulnerability can be easily exploited via wp-comments and it is recommended that everyone updates their version as soon as possible.
 
Sites that do not have the Shortcode Embeds module activated are not affected, but this module provides popular functionality so many websites are likely to have it enabled.
 
The Jetpack developers have worked with the WordPress security team to push updates to all affected versions through the WordPress core auto-update system. Jetpack versions 4.0.3 or newer contain the fix.
 
In case users do not want to upgrade to the latest version, the Jetpack developers have also released point releases for all twenty-one vulnerable branches of the Jetpack codebase: 2.0.7, 2.1.5, 2.2.8, 2.3.8, 2.4.5, 2.5.3, 2.6.4, 2.7.3, 2.8.3, 2.9.4, 3.0.4, 3.1.3, 3.2.3, 3.3.4, 3.4.4, 3.5.4, 3.6.2, 3.7.3, 3.8.3, 3.9.7, and 4.0.3.
&nbsp 

For more information and a personalized IT Solutions business offer, please contact us.

  
Source: www.computerworld.com