Advanced Network Constructors: Striking a Balance between Functionality and Security

in #wordpress5 months ago

In the realm of web development, a critical security concern was recently unveiled by renowned cybersecurity expert Calvin Alkan from Snicco Platform. During his meticulous examination, he exposed a vulnerability classified as CVE-2024-25600, affecting the widely used WordPress Bricks Builder theme. Boasting over 5,000 active installations, this theme,凭借其 intuitive interface and extensive customization capabilities, inadvertently positioned itself as a prime target for unauthorized access due to双重特性 - functioning as a theme and a sophisticated visual website constructor.

The vulnerability roots in a flawed execution of the eval() function during request variable preprocessing, enabling unauthenticated users to execute arbitrary PHP code on compromised websites. The pursuit of enhanced features by developers inadvertently opened a Pandora's box of security vulnerabilities.

In swift action, the vigilant WordPress security firm, Platform Patchstack, promptly notified the Bricks Builder development team about the discovered flaw. In response, an immediate patch, version 1.9.3, was released to mitigate the risk. According to the developers, there were no confirmed instances of exploitation at the time of the patch release, yet they strongly emphasize the necessity of updating to the latest version, 1.9.6.1, to significantly reduce the likelihood of potential threats.
OSSHTDz20240226030358.png

However, the situation escalated alarmingly on February 14th, when reports emerged that a proof-of-concept exploit exploiting the vulnerability had been successfully executed against a live Bricks Builder installation. This event underlined the urgency for widespread adoption of the patched version among users and served as a stark reminder of the delicate balance between enhancing functionality and maintaining robust security measures in the ever-evolving digital landscape.
WordPress Bricks主题0day漏洞(CVE-2024-25600)

先进的网络构建器为用户提供了功能,但同时剥夺了安全性。

Snicco 平台的独立网络安全专家 Calvin Alkan 最近 在WordPress 的高级 Bricks Builder 主题中发现了一个漏洞。该缺陷允许黑客在使用该主题的网站上执行任意 PHP 代码。

Bricks Builder 拥有近 25,000 个活跃安装,以其网站设计中的用户友好性和自定义选项而闻名。开发人员不仅将其描述为 WordPress 主题,而且将其描述为高级可视化网站构建器。已识别的漏洞被指定为 CVE-2024-25600 ,在使用默认设置安装 Bricks Builder 时会构成威胁。

该问题与请求变量准备期间使用 eval 函数有关,这可能允许未经身份验证的用户执行任意代码。

专门负责 WordPress 安全的 平台Patchstack及时 向 Bricks Builder 开发人员 报告了该问题,并于 2 月 13 日发布了更新 1.9.6.1 修复了该错误。

开发人员在帖子中表示,在发布修复程序时,他们尚未发现任何实际利用 CVE-2024-25600 的证据,但是建议用户更新到主题的最新版本,以最大程度地降低风险。

早在 2 月 14 日,Patchstack 和Wordfence的专家就开始记录利用该漏洞的尝试,因为很少有人会如此快地将易受攻击的产品更新到最新版本。在攻击中,攻击者使用专门的恶意软件来禁用已安装的安全插件,以增加成功利用 CVE-2024-25600 的机会。

鉴于这些进展,强烈建议所有使用 Bricks Builder 主题的 WordPress 网站所有者立即通过 WordPress 控制面板或手动将其更新到版本 1.9.6.1,以保护其资源免受潜在攻击。

Sort:  
Loading...

Coin Marketplace

STEEM 0.20
TRX 0.19
JST 0.034
BTC 90741.27
ETH 3105.77
USDT 1.00
SBD 2.95