Popular Convert Plus Plugin Vulnerability Exploit
Guide about Popular Convert Plus Plugin Vulnerability Exploit. **Description:** Unauthenticated Administrator Creation **CVSS v3.0 Score:** 10.0 **...
Description: Unauthenticated Administrator Creation
CVSS v3.0 Score: 10.0 (Critical)
Plugin Slug: convertplug
Affected Versions: <= 3.4.2
Patched Version: 3.4.3
On Friday May 24th, our Threat Intelligence team identified a vulnerability present in Convert Plus, a commercial WordPress plugin with an estimated 100,000 active installs. This flaw allowed unauthenticated attackers to register new accounts with arbitrary user roles, up to and including Administrator accounts. We disclosed this issue privately to the plugin’s development team, who released a patch just a few days later.
Convert Plus (formerly convertplug) versions up to 3.4.2 are vulnerable to attacks against this flaw. All Convert Plus users should update to version 3.4.3 immediately, as this is a critical security issue. We have released a firewall rule to protect Wordfence Premium users who may not be able to update yet, but we still recommend installing the patch. Free users will receive the new rule after thirty days.
Vulnerability In Detail
However, in vulnerable versions of the plugin, this intended user role wasn’t fetched from the database on submission. Instead, this setting was reflected in a hidden field on the plugin’s forms called cp_set_user. Because this value is supplied by the same HTTP request as the rest of the subscription entry, it can be modified by the user.
This code calls the plugin’s function cp_add_new_user_role with the role provided in the AJAX request, which then handles the process of creating the user as directed.
Since no filtering is applied when this new subscription is processed, if an attacker submits a subscription form and changes the value of cp_set_user to dministrator, the plugin will create an administrator user associated with the given email address. The new account is given a randomized password, but the attacker can issue a typical password reset to gain access to their rogue administrator account.
Video Demonstration
Disclosure Timeline
- May 24 – Vulnerability discovered. Notified developers privately.
- May 28 – Patch released by developers. Firewall rule released for Premium users.
- June 27 – Planned date for firewall rule’s release to Free users.
Well-Handled Response
Conversely, the response from Convert Plus’s team was an excellent example of how to handle a vulnerability disclosure. They responded quickly to our contact, and issued a patch for the flaw within just a few days. Once the patch went live, they published their own blog post alerting their users that an important update was available. They even highlighted the update on the plugin’s CodeCanyon page.
Convert Plus’s CodeCanyon page, featuring an alert regarding the security release.
Conclusion
In this post we shared details of a critical security flaw recently patched in the popular Convert Plus plugin for WordPress. This vulnerability has been patched as of version 3.4.3 of the plugin, and it’s crucial that all affected users patch as soon as possible. We have released a firewall rule which prevents exploits against Wordfence Premium users, which will be available to free users on June 27th.
As always, we will monitor our network for activity associated with this flaw and will update you with any noteworthy campaigns we identify.
Did you enjoy this post? Share it!
source: wordfence.com