How to Disable Access to Exploitation Path for Vulnerable Code in Outdated tagDiv Composer Plugin
On Monday, we discussed testing we did to see what WordPress firewall plugins were able to protect against a fixed vulnerability that has been exploited in the WordPress plugin tagDiv Composer. We also noted that the best solution was to update the plugin to the latest version, as this was fixed before the exploitation was happening. We subsequently had a new customer for our service contact us who mentioned they were unable to update things, as updating a connected theme was causing the website to break. With most WordPress plugin vulnerabilities, it is relatively easy to patch the code enough to stop exploitation of the vulnerability. That is true for this vulnerability, as we found when we looked into providing them such a patch.
A proof of concept for the vulnerability shows, the exploitation happens through the REST API route /tdw/save_css. At least in the version being used by our customer, 2.7, the relevant code for that route exists in the plugin’s file /css-live/includes/td_live_css_ajax.php. The registration for the route occurs in the function td_live_css_on_rest_api_init(): [Read more]