Wordpress data leakage risk flagged by security researcher
Content management system flaw could affect thousands of websites and blogs, it is feared.
Researchers have highlighted a flaw in the Wordpress content management system that could put millions of users at risk of data leakage.
According to a report by security firm Whitehat, the blogging platform may not completely protect media files uploaded to sites in the same way it safeguards text, which could potentially leave a listed company at risk of insider trading or a design firm to copyright theft.
The problem is that because the timing between the media and the blog post isn't identical, you can end up in a race condition with the content.
WhiteHat Security technical evangelist Robert Hansen said the flaw is down to how Wordpress assigns URLs.
This could make it easy for attackers to guess which files and attachments are for postings that have not gone live or been approved, it is feared.
"The problem is that because the timing between the media and the blog post isn't identical, you can end up in a race condition with the content," said Hansen.
"For instance, let's say you run a publicly traded company and you are about to release your earnings report on your blog. You may upload a PDF of the earnings report a day or multiple days in advance to make sure everything is perfect and ready to go when you announce."
An attacker might be able to guess the URL for the PDF of this earnings report and download it potentially days in advance, he added. "This would allow them to trade in advance of your company's earning reports.
Despite this, he claimed the flaw's severity is low, and apart from data leakage, it could not be used to mount attacks such as code injection or cross-site scripting.
Earlier this year, IT Pro reported that hackers were using brute force against thousands of Wordpress sites' administration accounts in order to compromise sites and spread malicious material.
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now