MSA-21-0003: Client side denial of service via personal message

by Michael Hawkins. Messaging did not impose a character limit when sending messages, which could result in client-side (browser) denial of service for users receiving very large messages.Severity/Risk:MinorVersions affected:3.10, 3.9 to 3.9.3, 3.8 to 3.8.6, 3.5 to 3.5.15 and earlier unsupported versionsVersions fixed:3.10.1, 3.9.4, 3.8.7 and 3.5.16Reported by:Rik GouwCVE identifier:CVE-2021-20185Changes More info: https://moodle.org/mod/forum/discuss.php?d=417168&parent=1680841

MSA-21-0004: Stored XSS possible via TeX notation filter

by Michael Hawkins. If the TeX notation filter was enabled, additional sanitizing of TeX content was required to prevent the risk of stored XSS.Severity/Risk:SeriousVersions affected:3.10, 3.9 to 3.9.3, 3.8 to 3.8.6, 3.5 to 3.5.15 and earlier unsupported versionsVersions fixed:3.10.1, 3.9.4, 3.8.7 and 3.5.16Reported by:Ata HakcilWorkaround:Disable the TeX notation filter until the patch has been applied. (Note that this filter is disabled by default.)CVE identifier:CVE-2021-20186Changes More info: https://moodle.org/mod/forum/discuss.php?d=417170&parent=1680845

MSA-21-0005: Arbitrary PHP code execution by site admins via Shibboleth configuration

by Michael Hawkins. It was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication.Severity/Risk:SeriousVersions affected:3.10, 3.9 to 3.9.3, 3.8 to 3.8.6, 3.5 to 3.5.15 and earlier unsupported versionsVersions fixed:3.10.1, 3.9.4, 3.8.7 and 3.5.16Reported by:Frédéric MassartWorkaround:Harcode preventexecpath to true in config.php, which prevents site administrators setting some executable paths via the UI. See More info: https://moodle.org/mod/forum/discuss.php?d=417171&parent=1680847

MSA-21-0005: Arbitrary PHP code execution by site admins via Shibboleth configuration

by Michael Hawkins. It was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication.Severity/Risk:SeriousVersions affected:3.10, 3.9 to 3.9.3, 3.8 to 3.8.6, 3.5 to 3.5.15 and earlier unsupported versionsVersions fixed:3.10.1, 3.9.4, 3.8.7 and 3.5.16Reported by:Frédéric MassartWorkaround:Harcode preventexecpath to true in config.php, which prevents site administrators setting some executable paths via the UI. See More info: https://moodle.org/mod/forum/discuss.php?d=417171&parent=1680847

Announcing Free Site Cleaning & Site Security Audits for K-12 Public Schools

Wordfence, the leading provider of WordPress security software and services, is announcing today that we are, effective immediately, offering free site cleaning and site security audit services to K-12 public schools in the United States who use WordPress as their content management system. Whether a site is infected with malware, or you are looking for […] More info: https://www.wordfence.com/blog/2021/01/announcing-free-site-cleaning-site-security-audits-for-k-12-public-schools/

Magento PHP Injection Loads JavaScript Skimmer

A Magento website owner was concerned about malware and reached out to our team for assistance. Upon investigation, we found the website contained a PHP injection in one of the Magento files: ./app/code/core/Mage/Payment/Model/Method/Cc.php … if ($_SERVER[“REQUEST_METHOD”] === “GET”){ if (strpos($_SERVER[“REQUEST_URI”], “/onestepcheckout/index/”) !== false){ if(!isset($_COOKIE[“adminhtml”])){ echo More info: http://feedproxy.google.com/~r/sucuri/blog/~3/pp87qW5hBU0/magento-php-injection-loads-javascript-skimmer.html

Password Policy Manager 2.3.4: improved plugin interoperability & bug fixes

Today we are in the third week of 2021, and we are happy to announce the third plugin update of the year: Password Policy Manager 2.3.4. This update features better interoperability with third party plugins, a few minor improvements, and a number of bug fixes. Let’s dive right into the below highlight to see what […] More info: https://www.wpwhitesecurity.com/ppmwp-2-3-4/

Critical Vulnerabilities in 123contactform-for-wordpress WordPress Plugin

In mass infection scenarios, our Malware Research team often looks for attack vectors to find patterns and other similarities among compromised websites. The identification of these patterns allows us to deploy better and faster solutions to our customers, minimizing impacts from massive attacks. Recently during a routine investigation, we found a number of vulnerabilities in […] More info: http://feedproxy.google.com/~r/sucuri/blog/~3/--9_7xc3sO4/critical-vulnerabilities-in-123contactform-for-wordpress-wordpress-plugin.html

WordPress Security: The Ultimate Guide

WordPress security can be intimidating, but it doesn’t have to be. In this comprehensive guide to WordPress security, we’ve simplified the basics of securing your WordPress website so that any non-technical person can understand and protect their website from hacker attacks. This guide to WordPress security is broken down into 10 easily digestible sections. Each […] More info: https://ithemes.com/wordpress-security-the-ultimate-guide/

2020 Year in Review: the best of WP White Security

2020 has been a challenging year for many. However, we have been very lucky and even though it was challenging, we’ve made the best out of it, and we turned it into a big one! So we wanted to take the time and look back at everything that happened at WP White Security. With remote […] More info: https://www.wpwhitesecurity.com/2020-year-review/
Translate »