24 Jun 2016

Wordfence’s Real-Time Threat Defense Feed Seems To Be Missing Many Plugin Vulnerabilities

Earlier this week we discussed the fact that Wordfence doesn’t actually check plugin vulnerabilities before claiming they are fixed, while writing up that post we noticed a feature of their service that looks like it doesn’t live up to their claims by a mile. Since the average webmaster isn’t going to have the knowledge to see through this, we though it would be good idea to make others aware of this.

As part of the marketing material on their homepage they have a section about their Real-Time Threat Defense Feed. Just with that name it sounds impressive,  but their description makes it sound more impressive: [Read more]

21 Jun 2016

Wordfence Doesn’t Actually Check Plugin Vulnerabilities Before Claiming They Are Fixed

Wordfence is a security company that we don’t think to highly off, due to things like fact that security vulnerabilities have been found in their security plugin numerous times and them not seeming to not have any clue what they are talking about. The problem is that a lot of people who don’t know have the security knowledge we have, have been tricked into thinking they have a clue what they are doing. To give you an example of this lets look at something we ran across recently.

Before we get into the details you really should read the comments of their blog post we are going to discuss part of in a second. It consist of lots of people thanking them for what the information they provided. What isn’t mention in those comments is that Wordfence is telling them things that they don’t actually have any idea as to whether they are actually true. This can be spotted in this part of the post discussing a plugin that they claimed had vulnerabilites that had been fixed: [Read more]

20 Jun 2016

Cross-Site Request Forgery (CSRF)/Cross-Site Scripting (XSS) Vulnerability in WP Fastest Cache

Recently in discussing Wordfence’s problematic practice of disclosing vulnerabilities, but only releasing partial details, in what appears to attempt to try to profit by being the only firewall provider who can protect against these, we mentioned that this practice makes it harder for other to review the vulnerabilities. That is important since we frequently find that vulnerabilites haven’t actually been fixed, they have only been partially fixed, or that the disclosure of one vulnerability will point the way to other vulnerabilities. When it comes Wordfence’s disclosures that concern already wasn’t a hypothetical. The first time they did that type of disclosure, with the Yoast SEO plugin, we found two related vulnerabilites that they had missed (which still have yet to be fixed).

Two more recent disclosures by Wordfence disclosed this way involved the WP Fastest Cache plugin. As we discussed in our post looking at the vulnerabilites, both vulnerabilites involved a situation where AJAX functions was accessible to any logged in users instead of just Administrator level users. This was fixed by checking if the the user making the request have the ability to manage_options. [Read more]

10 Jun 2016

Protecting You Against Wordfence’s Bad Practices: Authenticated Remote Code Execution (RCE) Vulnerability in EWWW Image Optimizer

Wordfence is putting WordPress website at risk by disclosing vulnerabilities in plugins with critical details needed to double check their work missing, in what appears to be an attempt to profit off of these vulnerabilities. We are releasing those details so that others can review the vulnerabilities to try to limit the damage Wordfence’s practice could cause.

Wordfence describes the vulnerability in EWWW Image Optimizer version 2.8.3 as a “Remote Command Execution vulnerability which an attacker can exploit on multisite WordPress installations to gain complete control of a WordPress site”. [Read more]

1 Jun 2016

How Wordfence Makes A Minor WordPress Plugin Vulnerability Sound Much More Serious

While there are many problems when it comes to website security, unfortunately we often find that security companies still feel the need to embellish minor security issues to make them in to much more than they are. This makes it harder to properly address security issues because the public doesn’t have the proper perspective as to the threats out there. It also leads to overhyped news article, since many security journalist simple repeat the claims of security companies without doing any verification.

To show that at work, lets look at something from a recent post from Wordfence. They disclosed that the plugin Caledera Form had a vulnerability that allowed “an attacker to gain access to potentially sensitive data that has been captured by a Caldera Form.”  No details were provided as to what the attacker would need to do that, which is really important. If they had, it would be clear that this isn’t a threat for most websites using the plugin. [Read more]

26 May 2016

Protecting You Against Wordfence’s Bad Practices: Local File Inclusion Vulnerability in WP Fastest Cache

Wordfence is putting WordPress website at risk by disclosing vulnerabilities in plugins with critical details needed to double check their work missing, in what appears to be an attempt to profit off of these vulnerabilities. We are releasing those details so that others can review the vulnerabilities to try to limit the damage Wordfence’s practice could cause.

Wordfence describes the vulnerability in WP Fastest Cache version 0.8.5.7 as “The Local File Inclusion vulnerability allows an attacker to execute code on the target web server or on a site visitor’s browser. This enables the attacker to steal or manipulate data, perform a denial of service attack or enable additional attack types such as Cross Site Scripting.” [Read more]

25 May 2016

Protecting You Against Wordfence’s Bad Practices: Unauthorized Options Update Vulnerability in WP Fastest Cache

Wordfence is putting WordPress website at risk by disclosing vulnerabilities in plugins with critical details needed to double check their work missing, in what appears to be an attempt to profit off of these vulnerabilities. We are releasing those details so that others can review the vulnerabilities to try to limit the damage Wordfence’s practice could cause.

Wordfence describes the vulnerability in WP Fastest Cache version 0.8.5.7 as “The Options Update vulnerability allows an attacker to access and make changes to the CDN (Content Delivery Network) options for the website. With this control an attacker can direct all requests for css files, images, videos, etc. to their site, allowing them to serve malicious content to visitors of the vulnerable site.” [Read more]

25 May 2016

Protecting You Against Wordfence’s Bad Practices: Sensitive Data Exposure Vulnerability in Caldera Forms

Wordfence is putting WordPress website at risk by disclosing vulnerabilities in plugins with critical details needed to double check their work missing, in what appears to be an attempt to profit off of these vulnerabilities. We are releasing those details so that others can review the vulnerabilities to try to limit the damage Wordfence’s practice could cause.

Wordfence describes the vulnerability in Caldera Forms version 1.3.5.2 as “This vulnerability allows an attacker to gain access to potentially sensitive data that has been captured by a Caldera Form.” [Read more]

25 May 2016

Wordfence’s Bad Security Research Practices Putting WordPress Websites At Risk

When it comes to security companies in general we don’t think to highly of them, while the company Wordfence isn’t an excerption. There are not as bad as, say, SiteLock, but we keep bumping in to bad stuff involving them. Like a month ago when we noticed them again falsely flagging plugins for suspected malware due to a quite bad false positive. The latest incident involves their security research, which now twice we have found putting websites at risks either seemingly because of the lack of expertise or from trying to profit off of exposing vulnerabilities.

Missed Vulnerabilities

This began about three weeks ago when they had released partial details of a fairly minor vulnerability in the plugin Yoast SEO. The vulnerability would allow Subscriber level and above users on a website to export the plugin’s settings and some other data. While reviewing this report to add the vulnerability to our data set we noticed several issues. [Read more]

26 Apr 2016

Wordfence’s Bad False Positive for WordPress Plugin Causes Nuisance for Public and Its Developer

One of the major problems with anti-virus software for computers is that the signatures they use to detect malicious code can falsely detect non-malicious code as being the malicious code they are supposed to be identifying. In more serious cases that can cause critical operating system files to be removed and the computer to no longer be functional.

Security products for websites, instead of learning from the mistakes of the computer based counterparts, have carried on this tradition, causing problems for developers of WordPress plugins. We have personal experience with that through our plugin connected with this service. On several instances we had people reporting that our plugin contained malicious files, one example is in a review of the plugin. The only in thing in the supposedly malicious files was the data on vulnerabilities like this: [Read more]