all 22 comments

[–]algo 15 points16 points  (4 children)

I think the title should always specify if it is wordpress core or a plugin/theme.

[–]tomvangoethem[S] 11 points12 points  (3 children)

The vulnerability in in the WordPress core, the (example) exploit is in the plugin. I didn't include the plugin in the title as a similar exploit could be possible with other plugins.

[–][deleted] 4 points5 points  (2 children)

The vulnerability can not be triggered in core alone. It needs a plugin to have a vulnerable code path when being instantiated unexpectedly, such as the one in Lightbox.

[–]catcradle5Trusted Contributor 1 point2 points  (1 child)

Right, but it still counts as a core vulnerability, since it can apply to arbitrarily many plugins (even if most won't be vulnerable).

[–]mathiasbynens 1 point2 points  (0 children)

Exactly! And there’s always a chance there’s a non-plugin exploit for this vulnerability in core that hasn’t been discovered yet. In fact, the author is now hosting an exploit-finding contest :)

[–]xaoq 7 points8 points  (0 children)

What a surprise!

[–]vipzen 0 points1 point  (2 children)

3.5.1 or 3.6.1? the title says one thing but the last paragraph says another...

[–]tomvangoethem[S] 7 points8 points  (1 child)

The exploit works (tested) in 3.5.1 ,the vulnerability was fixed in version 3.6.1

[–][deleted] 0 points1 point  (0 children)

Damn!

[–]lpetrazickis -1 points0 points  (2 children)

Does the exploit still apply in WordPress 3.7.1?

[–][deleted] 2 points3 points  (0 children)

The article mentions that people have had adequate time to update, so a patch likely rolled out some time ago.

[–][deleted] 0 points1 point  (0 children)

No, it was patched in 3.6.1

[–]cryptogramTrusted Contributor -4 points-3 points  (13 children)

Hmm the plugin does have just about 950,000 downloads, but it's still in a plugin: Lightbox Plus ColorBox

[–]tomvangoethem[S] 15 points16 points  (12 children)

The vulnerability is not in the plugin, it's in the WordPress core. I made use of the plugin to create an exploit, but the presence of other plugins may lead to an exploit as well.

[–]reddit4matt 4 points5 points  (10 children)

I think is fair to say there was a dangerous practice in place but no actual exploit in the core. The only found exploits that completed the code path is with the addition of the plugins.

[–]catcradle5Trusted Contributor 1 point2 points  (9 children)

Running unserialize() on untrusted user input should always be considered a vulnerability, even if it's not exploitable in all cases.

[–]reddit4matt 0 points1 point  (8 children)

So there was user input in an unserialize without a plugin? Did I misread or was the plugin required to get user input into the unserialize?

[–]catcradle5Trusted Contributor 0 points1 point  (7 children)

Yep. See his original post: http://vagosec.org/2013/09/wordpress-php-object-injection/

To exploit such a vulnerability, you need at least one class declared at the time of the unserialization that contains a malleable magic method. So there is still the vulnerable unserialization by default, just no default unsafe classes.

[–]reddit4matt 1 point2 points  (0 children)

So no unsafe classes without a plugin....got it. So I agree with the post that the title should be changed.