A Song of Ice and FireAlphaGoAntivirusArtificial IntelligenceBashBod PressBusinessCharityChatbotChildrenComputerConflict ZoneCouchDBEbola VirusFM ReceiverGame of ThronesGeolocationGeorge R.R. MartinGuideIncorporationInformation SecurityIoTJavaScriptLawLearningLinus TorvaldsMedicine Mental IllnessNewsNoSQLOperating SystemRansomwareRansomware DayReviewRevolutionRobotsSHA-1San FranciscoScienceSmall BusinessSolar EclipseTechnologyThe Fourth Industrial RevolutionThe FutureTime ManagementUnix-likeVanilla ForumsWana Decrypt0rWelcomeWordpressWorld Bank GroupZero-day Vulnerability

Zero-day Vulnerabilities in Wordpress and Vanilla Forums Allow You to Remotely Crack Sites

The data about critical vulnerabilities in WordPress were published - they allow remote execution of shell commands and resetting the administrator password through the substitution of the Host header. In addition, there has been described two similar critical vulnerabilities in the open source Vanilla Forums.

WordPress Vulnerability

The detected vulnerability (CVE-2017-8295) affects all versions of WordPress, including build 4.7.4. The information about security problems has repeatedly been passed to WordPress developers, but they have not issued a formal fix yet.

The attack is described in detail in a particular security bulletin. Its essence is to use a logical error in the WordPress password recovery mechanism. When a user requests such a change, WordPress generates a unique secret code and sends it to an email that is stored in the database.

When the message is sent, the SERVER_NAME variable is used to get the hostname of the server. This is necessary to set the values in the From/Return-Path fields. The From field stores the sender's address, and the "Return-Path" stores the address to which the 'bounce-back' messages should be delivered, they are generated in case of sending failure.

An attacker can send a special HTTP request with a pre-set hostname (for example, attacker-mxserver.com) and simultaneously initiate a password reset process for a user - for instance, a site administrator.

Since the host name in the HTTP request is the domain controlled by the attacker, the From and Return-Path fields in the password reset email will be changed so that they include the email address associated with the hacker's domain - for example, wordpress@attacker-mxserver.com instead of wordpress@victim-domain.com.

The letter with the code for resetting the password will still be sent to the victim's address, however, only under certain conditions, the attacker can get it.

  1. If the victim responds to the email, the response will already be sent to the attacker's address (it is now stored in the From field), and the link to reset the password will be saved in the correspondence history.
  2. If for some reason, the message is not delivered to the victim, the failure message will be automatically forwarded to the attacker's address (it is specified in the Return-Path).
  3. Another possible scenario is that in order for the original message not to be delivered to the victim, an attacker can conduct a DDoS attack on the target user's email server or send a large number of emails to his address, ensuring that the mailing address can no longer receive messages. This will cause the delivery to fail, and a message will be delivered to the attacker.

Manipulations with the SERVER_NAME header using the Host HTTP header can be performed on the default settings of the Apache web server, which is most often used to deploy WordPress.

Since there is no official patch for closing the vulnerability, it's recommended to site administrators of WordPress updating the configuration by activating the UseCanonicalName option, which will set the static value of SERVER_NAME and make the attack impossible.

What's wrong with Vanilla Forums

The data about two critical vulnerabilities in the popular open source software Vanilla Forums was published. The first one (CVE-2016-10033) paves the possibility of remote code execution, and the second one (CVE-2016-10073) is similar to the vulnerability in WordPress and allows to conduct attacks to intercept messages to reset the password. For both errors, there is currently no patch. The latest version of Vanilla Forums 2.3 is also vulnerable.

The possibility of remote execution of shell commands appeared in the Vanilla Forums because the developers of the product still use the vulnerable version of the popular open source library PHPMailer for sending email messages. The vulnerabilities were discovered in January 2017 and passed to the developers, the errors were not corrected, and the information about them was published. A similar vulnerability was previously discovered by the Wordpress researcher.

Last year, the researcher reported on the detection of a critical vulnerability (CVE-2016-10033) in the PHPMailer library, which allows remote execution of shell commands in the context of the web server - this leads to compromising of the attacked web application.

The vulnerability can be exploited even if the Vanilla Forums is installed on the Apache web server with several V hosts enabled, and the attacked software itself is not the default virtual host.

Until the developers of Vanilla Forums have released the update, it's recommended to site administrators to set the sender's email address as a predefined static value - this will block the use of Host headers.

In order to protect your Windows from viruses use the most modern intelligent antivirus software developed by Bod Security.

The developers should immediately fix this.

Related Coverage

If, like me, you’re northern, when visiting London you might find yourself taking a sip of a deliciously crisp pint only to spit it out in surprise when the bartender hits .


The policies of US President Donald Trump have deep implications, not just for the United States, but also for the wider world. He has taken the .


Robot Thanks to the development of AI and IoT technologies, the use of robots in manufacturing and industry has risen considerably between 2016 and 2017. In fact, the worldwide shipment of robots rose from 294,000 to 387,000 in that time - a large inc.


There are certain new technologies that are very much on trend at the moment. These are techs that dominates conversations and is at the centre of media excitement, leading to much hype, fevered speculatio.


Ever since the space race (that ended in 1969) territories beyond Earth have been deemed to be one of final frontiers of human conquest. But how possible is it that space travel .


In the grand scheme of things, human life has not existed on earth for very long. While many species, such as crocodiles, date back 200 million years, modern humans have only been around for some 200,000 years. Despite our shor.


(Technology 3D print car via Pixabay) When it comes to new technology, I often find myself asking whether or not it is really necessary. The need for convenience in a fast-pac.


(Img src: Max Pixel) One of the biggest technological advancements of our time is 3D.


(Sunrise space outer via Pixabay) It seems almost a lifetime ago that the US and Russia were locked in a desperate struggle to reach space. Fifty years hence, and it seems we .


Free Antivirus Software Over 8 years have gone after Windows 7 was introduced it's as yet the most mainstream Windows out there. In any case, the sudden rise of the substantial scale ransomware disease demonstrated to us some unquestionable security escape clauses in Microsoft's fan top choice. Fundamentally, a lot of clients set aside the way that the obsolete Security Essentials ca.


The Internet of Things has had a huge impact on the way many industries are approaching the future, with lots of research centred around IoT, and the success of smartwatches has shown the clear potential in wearable technology. Combining IoT with clothing makes a lot of sense, as it takes advantage of items that are on our person for long periods of the day. Over the next few years, wearable te.


October 4th, 1957: the Soviet Union launched the very first satellite, Sputnik 1, into Space. It was the first time humanity had sent any object in to space. Twelve years later, in July 1969, Neil Armstrong became the first person to walk on the moon, paving the way for increasingly bo.


Although there have been many smaller developments, and numerous aesthetic changes along the way, the face of transportation has looked fairly similar for the past few decades. Despite promises of hover cars, our roads are still lined with four-wheeled vehicles, trains still run on tracks, and planes are still cramped and noisy. There have been advancements, and in the next few years you can ex.


Legal issues At some point in life, everyone gets an idea of starting their own business – be it that of dealing in diamonds, opening a restaurant or simply starting a bar they always wanted to open! It is always exciting to start a small business of your own and dreaming about it.


One of the most challenging tasks in computer programming is developing an OS and frankly, is not for everyone except the most hard core geekheads among you. In order to start with creating your very own OS let us start by viewing the basic definitions of what a BIOS or boot loader is and does. An operating.

January 20, 11 AM
AlphaGo Beginner's Guide

AlphaGo Everyone knows that DeepMind's AlphaGo defeated 18 times world champion Lee Sedol on March 9 2016 at the ancient Chinese game- Go. What’s fascinating is that the game of Go has as many possible moves as there are atoms in the universe. This motivated us to find out more about AlphaGo.


Last month, the World Bank Group published the World Development Report (WDR) 2018, the first-ever edition entirely focused on education. The report warns of a learning crisis in global education and the severity of this in the deprived areas. Shockingly, there are still around 260 million children who aren’t even enrolled in primary or secondary schools. Education is meant to equip stud.


Medicine is the most rapidly growing area of expertise. In recent decades, new technologies and scientific discoveries have changed the idea of the body and its diseases and at the same time the approach to the treatment of the whole person.


he World Health Organization estimates that about 300 million people around the world are suffering from depression, 60 million from bipolar affective disorder, and 21 million from schizophrenia.


The Internet of Things The first three industrial revolutions were triggered by steam, electricity, and, and wired computers which transformed people’s way of life and manufacturing and brought digital capabilities to billions of people.


Opening your own business is a task that is certainly difficult and responsible, but experienced entrepreneurs will agree that real difficulties come when you start developing an already launched project.


Automation of business processes is no longer just an evolving trend in digital marketing. Today it is an integral part of a brand communication.


We all have stories about working in dysfunctional offices, with wacky colleagues and under stressful deadlines. But even this cannot compare to working in a conflict zone, a place that is ravaged by war.


Game of ThronesGeorge R.R. Martin is an American novelist, fantasy, sci-fi and short story writer. Most of the world got acquainted with him after screen adaptation of his epic saga "a Song of Ice and Fire".


Over the last years the art of time management gains popularity. Why so? The answer is very simple: we want to control our life. No wonder there are plenty of interesting techniques allowing us to properly schedule and manage our time.


Ebola Virus The Ebola virus causes a severe illness that is often lethal in the absence of treatment.

July 11, 09 AM
Welcome to Bod Press

Bod Press is a global social network for readers, journalists and companies engaged in writing and reading. The unique audience, fresh information, constructive communication, and collective creativity.


Bod Intelligent Antivirus This review is dedicated to the Bod Intelligent Antivirus developed by Bod Security. The purpose of the article is to show its functionality and demonstrate how it behaves in real conditions.

1009 2

wordpress Automattic Company, the developer of WordPress, will no longer spend money on maintaining the office in San Francisco.


Computer Technology It seems that many years have passed, which made an eternity by the standards of the world of computer technology. And the reflection on past mistakes does not stop. And what would have happened if...


Robotic assistant Millions of American families buy automatic voice assistants to turn off the lights instead of themselves, order pizza and show movie program in the cinema.


More than 60,000 computers were attacked and infected with a virus-extortionist Wana Decrypt0r.


At some time, I had to work with one of the document-oriented DBMS – Apache CouchDB, but I had some difficulties with the search of the documentation.


The article describes how to work with push notifications about object events in browsers.


Imagine that you are sitting and waiting for someone in the car, and the poster of your favorite group has caught your eye.


We will organize the small distribution of free stuff for those who aspire to bring something good, kind, wise, and eternal to children.


Google's co-workers and the Centre of Mathematics and Computer Science in Amsterdam, presented the first algorithm generating collisions for SHA-1.


The idea of editing the user environment variables to elevate the rights in penetration testing is as old as the world.

Never miss a story by George Ford, when you sign up for Bod Press.
Sign up