0
Your Cart
No products in the cart.

Learn how effective pillar pages and clustered content improve site structure, internal linking, and on-page SEO.
The third edition of Ranking Factors is finally here! It got a little makeover both in looks and content inside. And, for the first time, we’ve put all the factors into a sortable sheet to find the info you need, faster.
With CallRail’s VP of Product, Jason Tatum, we will also cover the past and future state of phone calls, and how you can use AI to gain valuable insights that will transform your business. 
Learn how effective pillar pages and clustered content improve site structure, internal linking, and on-page SEO.
Learn how effective pillar pages and clustered content improve site structure, internal linking, and on-page SEO.
With CallRail’s VP of Product, Jason Tatum, we will also cover the past and future state of phone calls, and how you can use AI to gain valuable insights that will transform your business. 
All-In-One Security (AIOS) WordPress plugin vulnerabilities impact up to +1 million WordPress sites
WordPress security plugin discovered to have two vulnerabilities that could allow a malicious upload, cross-site scripting and allow viewing of contents of arbitrary files.
The All-In-One Security (AIOS) WordPress plugin, provided by the publishers of UpdraftPlus, offers security and firewall functionality designed to lock out hackers.
It offers log-in security protection that locks out attackers, plagiarism protection, blocks hotlinking, comment spam blocking and a firewall that serves as a defense against hacking threats.
The plugin also enforces proactive security by alerting users to common mistakes like using the “admin” user name.
It’s a comprehensive security suite that’s backed by the makers of Updraft Plus, one of the most trusted WordPress plugin publishers.
These qualities make AIOS highly popular, with over one million WordPress installations.
The United States government National Vulnerability Database (NVD) published a pair of warnings about two vulnerabilities.
The first vulnerability is due to a data sanitization failure, specifically a failure to escape log files.
Escaping data is a basic security process that strips any sensitive data from outputs generated by a plugin.
WordPress even has a developer page devoted to the topic, with examples of how to do it and when to do it.
WordPress’ developer page on escaping outputs explains:
“Escaping output is the process of securing output data by stripping out unwanted data, like malformed HTML or script tags.
This process helps secure your data prior to rendering it for the end user.”
The NVD describes this vulnerability:
“The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not escape the content of log files before outputting it to the plugin admin page, allowing an authorized user (admin+) to plant bogus log files containing malicious JavaScript code that will be executed in the context of any administrator visiting this page.”
The second vulnerability appears to be a Path Traversal vulnerability.
This vulnerability allows an attacker to exploit a security failure in order to access files that would not ordinarily be accessible.
The non-profit Open Worldwide Application Security Project (OWASP) warns that a successful attack could compromise critical system files.
“A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder.
By manipulating variables that reference files with ‘dot-dot-slash (../)’ sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files.”
The NVD describes this vulnerability:
“The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not limit what log files to display in it’s settings pages, allowing an authorized user (admin+) to view the contents of arbitrary files and list directories anywhere on the server (to which the web server has access).
The plugin only displays the last 50 lines of the file.”
Both vulnerabilities require that an attacker acquire admin level credentials to exploit the attack, which might make it harder for the attack to happen.
However one expects a security plugin to not have these kinds of preventable vulnerabilities.
AIOS released a patch in version 5.1.6 of the plugin. Users may wish to consider updating to at least version 5.1.6, and possibly to the latest version, 5.1.7, which fixes a crash that occurs when the firewall is not set up.
CVE-2023-0157 Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CVE-2023-0156 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
Featured image by Shutterstock/Kues
Roger Montti is a search marketer with over 20 years experience. I offer site audits and phone consultations.  See me ...
Conquer your day with daily search marketing news.
Join Our Newsletter.
Get your daily dose of search know-how.
In a world ruled by algorithms, SEJ brings timely, relevant information for SEOs, marketers, and entrepreneurs to optimize and grow their businesses -- and careers.
Copyright © 2023 Search Engine Journal. All rights reserved. Published by Alpha Brand Media.

source