Date : 8/11/2014 3:14:36 PM
From : "Avraham Zaruk"
To : "idf-cyb"
Subject : FYI
Attachment : 32407_image001.png;32407_image002.png;32407_image003.png;


[IT-ISAC] Open Source News, 8th of August 2014

Title: Critical Bug In WordPress Plugin Allows Site Hijacking  

Date Published: 8th of August 2014

URL:http://www.net-security.org/secworld.php?id=17227

Excerpt:
A popular WordPress plugin that allows site owners to easily customize the contact form has a critical vulnerability that can be exploited to download and remotely modify the site's database, and gain access and control of the site - no account or authentication needed. The discovery was made by researchers of security company Sucuri, and the developers of the plugin - Custom Contact Forms - have been notified, but have finally moved to patch the hole only after the WordPress Security team pushed the issue.All versions of the plugin except the last (5.1.0.4) are affected, and users are advised to update it as soon as possible. Given the unresponsiveness of the Custom Contact Forms team, the option of switching to another form customization plugin such as Gravity Forms or an entire WP suite that offers the feature is also worth considering.Custom Contact Form has been downloaded over 600,000 times. If only half of these users actively use it, that is still a considerable number of vulnerable WordPress sites out there.

 

אברהם זרוק  |  מנהל מערך סייבר ואבטחת מידע  |  ממשל זמין

טל.  

02-6664643

  |  

054-4818088

  |  

Az@gov.il

         

 

 

תוכן הודעת דואל זו שייך בלעדית לממשל זמין ומיועד אך ורק למכותבי ההודעה אם אינך אחד מהמכותבים, כל פעולות חשיפה, העתקה או הפצה של ההודעה הינן אסורות