wordpress

Vulnerability Zero Day on WordPress sites

An attacker may be able to take full control of a website that uses the platform WordPress due to the lack of the cryptographically secure pseudorandom number generator (CSPRNG).Wordpress

CSPRNG is a mechanism that generates random numbers in one , which can be applied for cryptographic purposes, such as generating keys or salts. The numbers are pseudorandom because a truly random sequence can only be produced at a theoretical level.

The στο WοrdPress ανακαλύφθηκε από τον Scott Arciszewski, έναν Web προγραμματιστή από το Orlando της Florida. Έχει ενημερώσει ήδη τους τεχνικούς της WοrdPress για την ανάγκη της εφαρμογής ενός μηχανισμού CSPRNG στην πλατφόρμα, προκειμένου να εξαλειφθεί ακόμη και την παραμικρή πιθανότητα να μπορεί κάποιος να προβλέψει το link που χρησιμοποιείται για την of passwords.

Anyone who succeeds will be able to violate all WorrdPress that exist on the web. However, there is currently no available method.

Arciszewski says he has often tried to bring the issue to the attention of WorPress's technicians. 25 2014 for the first time in XNUMX, opening a ticket for the topic on the platform tracker. The next time was during WordCamp in Orlando, a conference that focused on WorPress platform.

A published by the researcher which completely reveals the vulnerability, also has a patch created by itself, which has not yet been integrated into WordPress.

Patch available with unit tests and PHP 5.2 on  support at
https://core.trac.wordpress.org/attachment/ticket/28633/28633.3.patch

Remember that WordPress is used by 75 websites on the internet. Nevertheless, this particular vulnerability requires a lot of knowledge and skills, which discourages many would-be hackers.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).