On February 5, 2018, an independent researcher disclosed a zero-day WordPress DoS vulnerability that allows application-level denial of service (AppDoS) attacks against websites using the WordPress platform.
Download a Copy Now
On February 5, 2018, an independent researcher
disclosed a zero-day WordPress DoS vulnerability that allows application-level denial of service (AppDoS) attacks against websites using the WordPress platform. WordPress is an open source content management system (CMS) written in PHP and
powers over 29% of the Internet’s sites and blogs.
The WordPress DoS vulnerability (
CVE-2018-6389) allows remote attackers to impact the performance and availability of any website leveraging WordPress. Attackers only require a single connected system with limited resources and bandwidth to inflict performance issues all the way up to website unavailability.
Using a single request to
https://WPServer/wp-admin/load-scripts.php the WordPress DoS vulnerability allows an attacker to retrieve up to 181 JS modules from the server resulting in 181 file requests and almost 4MB of data transferred from the webserver to the client.
Using only a few lines of code, an attacker can easily launch concurrent requests and impact performance or bring down the site by consuming the server’s CPU or saturating the outbound bandwidth.
WordPress DoS attackers can also leverage this technique for
low and slow attacks, affecting CPU and consuming bandwidth over longer periods of time that could ultimately lead to higher bills at the end of the month for hosted sites that have contractual caps on CPU and/or bandwidth utilization. These low and slow attacks will go unnoticed until it is too late and are hard to identify without extra measures or alerting tools monitoring the abuse of the load-scripts.php page.
At the time of publication, Radware is only aware of a few dozen isolated exploit attempts. Since the vulnerability is now publicly disclosed and will remain unpatched, Radware considers this WordPress DoS vulnerability to be critical for ensuring availability of WordPress-based websites. The Wordpress DoS vulnerability is easily exploited and it is possible that an increase in
DoS attacks and
ransom DoS attack campaigns targeting WordPress-based sites will happen.
How to Prepare
DoS vulnerabilities are not in the scope of the bug bounty program provided by WordPress. The WordPress DoS vulnerability was not considered as a bug or for future improvement by WordPress developers. WordPress’ official statement was “This kind of thing should really be mitigated at the server or network level rather than the application level, which is outside of WordPress's control.”
The discoverer of the WordPress DoS vulnerability provides a forked WordPress project that includes a patch for the vulnerability without breaking wp-login.php. Despite the efforts of
Barak Tawily for providing a bash script and a forked version of the project, Radware advises against using any descendants or forks that are not officially recognized by WordPress. Future bug fixes and improvements might not be timely provided through unofficial branches of the project and therefore should be avoided if possible.
Detection and mitigation algorithms prevent attacks from scripts and automated tools without impacting good bots. Behavior algorithms are continuously monitoring and profiling individual client’s actions and are able to detect and mitigate abuse from malicious users that might try to manually exploit the WordPress DoS vulnerability through repeatedly requesting the offending URL.
Effective DDoS Protection Essentials
- Hybrid DDoS Protection - On-premise
DDoS defense and
cloud DDoS protection for real-time
DDoS attack prevention that also addresses high volume attacks and protects from pipe saturation
- Behavioral-Based Detection - Quickly and accurately identify and block anomalies while allowing legitimate traffic through
- Real-Time Signature Creation - Promptly protect from unknown threats and zero-day attacks
- A Cyber-Security Emergency Response Plan - A dedicated emergency team of experts who have experience with Internet of Things security and handling IoT outbreaks
- Intelligence on Active Threat Actors – high fidelity, correlated and analyzed date for preemptive protection against currently active known attackers.
For further network and
application security and
DDoS protection measures, Radware urges companies to inspect and patch their network in order to defend against risks and threats.
Effective Web Application Security Essentials
To prevent this vulnerability from being exploited a Web Application Firewall is required that leverages advanced bot detection and mitigation algorithms that detect and block malicious scripts and automated tools without applying any penalty on ‘good’ bots. Users that might try to exploit the vulnerability manually by repeatedly requesting the offending URL will be blocked. This dynamic profile of application-traffic behavior yields an accurate anomaly detection of zero-day attacks.
- Full OWASP Top-10 coverage against defacements, injections, etc.
- Low false positive rate – using negative and positive security models for maximum accuracy
- Auto policy generation capabilities for the widest coverage with the lowest operational effort
- Bot protection and device fingerprinting capabilities to overcome dynamic IP attacks and achieving improved bot detection and blocking
- Securing APIs by filtering paths, understanding XML and JSON schemas for enforcement, and activity tracking mechanisms to trace bots and guard internal resources
- Flexible deployment options - on-premise, out-of-path, virtual or cloud-based
Under Attack and in Need of Expert Emergency Assistance? Radware Can Help
Radware offers a
DDoS protection service to help respond to security emergencies, neutralize the risk and better safeguard operations before irreparable damages occur. If you’re under DDoS attack or malware outbreak and in need of emergency assistance,
contact us with the code "Red Button."