{"id":2234,"date":"2017-02-06T07:16:00","date_gmt":"2017-02-06T06:16:00","guid":{"rendered":"http:\/\/borncity.com\/win\/?p=2234"},"modified":"2022-11-04T11:47:48","modified_gmt":"2022-11-04T10:47:48","slug":"wordpress-4-7-2-and-its-security-holes","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2017\/02\/06\/wordpress-4-7-2-and-its-security-holes\/","title":{"rendered":"WordPress 4.7.2 and it&rsquo;s security holes"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2014\/07\/wp_thumb.jpg\" width=\"64\" align=\"left\" height=\"64\">WordPress has been updated a few days ago to version 4.7.2. It was a maintenance update that fixed also hidden security holes. But another issue with REST API is still open and an exploit is available in the wild. Now thousands of WordPress sites are compromised.<\/p>\n<p><!--more--><\/p>\n<p>If you don't use WordPress auto update, immediately update to version 4.7.2. Last week I received a security warning from WordFence security specialists pointing to <a href=\"https:\/\/www.wordfence.com\/blog\/2017\/02\/reminder-to-update-to-wordpress-4-7-2-and-check-your-site\/\" target=\"_blank\" rel=\"noopener noreferrer\">this blog post<\/a>. Folks from Bleeping Computer has published the article <a href=\"https:\/\/web.archive.org\/web\/20220628195616\/https:\/\/www.bleepingcomputer.com\/news\/security\/wordpress-team-fixed-a-zero-day-behind-everyones-back-and-told-no-one\/\" target=\"_blank\" rel=\"noopener noreferrer\">WordPress Team Fixed a Zero-Day Behind Everyone's Back and Told No One<\/a> that should alarming every WordPress administrator. Now an exploit is available in the wild and its used. <\/p>\n<p>There is also a 2nd issue with the new WordPress REST-API \u2013 WordFence's security experts has already published <a href=\"https:\/\/www.wordfence.com\/blog\/2016\/12\/wordfence-blocks-username-harvesting-via-new-rest-api-wp-4-7\/?utm_source=list&amp;utm_campaign=121216&amp;utm_medium=email\" target=\"_blank\" rel=\"noopener noreferrer\">this blog post<\/a> about that issue. And now it seems that thousands of WordPress sites are hacked. <\/p>\n<p><img decoding=\"async\" title=\"Kompromittierte WordPress-Seiten\" alt=\"Kompromittierte WordPress-Seiten\" src=\"https:\/\/i.imgur.com\/zcyPwdJ.jpg\"><\/p>\n<p>I did a Google search for string <a href=\"https:\/\/www.google.de\/webhp?sourceid=chrome-instant&amp;ion=1&amp;espv=2&amp;ie=UTF-8#q=by+w4l3XzY3+\" target=\"_blank\" rel=\"noopener noreferrer\">by w4l3XzY3<\/a> and found a lot hits of compromised sites. Then I received a security notification <a href=\"https:\/\/blog.sucuri.net\/2017\/02\/wordpress-rest-api-vulnerability-abused-in-defacement-campaigns.html?\" target=\"_blank\" rel=\"noopener noreferrer\">from Sucuri<\/a> reporting, that also other groups are trying to actively using zero-day exploits to compromise WP sites. If you are running a WordPress firewall, you should be protected against this vulnerability (that comes within the WP core). The other solution in WordPress 4.7.2: disable REST-API (you can use the WP <a href=\"https:\/\/wordpress.org\/plugins\/disable-json-api\/\" target=\"_blank\" rel=\"noopener noreferrer\">Disable REST API<\/a> plugin to do that). <\/p>\n","protected":false},"excerpt":{"rendered":"<p>WordPress has been updated a few days ago to version 4.7.2. It was a maintenance update that fixed also hidden security holes. But another issue with REST API is still open and an exploit is available in the wild. Now &hellip; <a href=\"https:\/\/borncity.com\/win\/2017\/02\/06\/wordpress-4-7-2-and-its-security-holes\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,580],"tags":[69,359],"class_list":["post-2234","post","type-post","status-publish","format-standard","hentry","category-issue","category-security","tag-security","tag-wordpress"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/2234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=2234"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/2234\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=2234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=2234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=2234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}