DoS of https://blog.yelp.com/ and other WP instances via CVE-2018-6389
Medium
Y
Yelp
Submitted None
Actions:
Reported by
muhammaddaffa
Vulnerability Details
Technical details and impact analysis
Description:
There is possibility in /wp-admin/load-scripts.php script to generate large (~3Mb) amount of data via simple non-authenticated request to server.
The vulnerability is registered as https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
Details:
Detailed attack scenario is described for example here: https://baraktawily.blogspot.ru/2018/02/how-to-dos-29-of-world-wide-websites.html
Affected URL:
https://www.yelpreservations.com/blog/wp-admin/load-scripts.php?load=common,wp-a11y,sack,quicktag,colorpicker,editor,wp-fullscreen-stu,wp-ajax-response,wp-api-request,wp-pointer,autosave,heartbeat,wp-auth-check,wp-lists,prototype,scriptaculous-root,scriptaculous-builder,scriptaculous-dragdrop,scriptaculous-effects,scriptaculous-slider,scriptaculous-sound,scriptaculous-controls,scriptaculous,cropper,jquery,jquery-core,jquery-migrate,jquery-ui-core,jquery-effects-core,jquery-effects-blind,jquery-effects-bounce,jquery-effects-clip,jquery-effects-drop,jquery-effects-explode,jquery-effects-fade,jquery-effects-fold,jquery-effects-highlight,jquery-effects-puff,jquery-effects-pulsate,jquery-effects-scale,jquery-effects-shake,jquery-effects-size,jquery-effects-slide,jquery-effects-transfer
How to fix:
RewriteCond %{QUERY_STRING} ^.{1000,}$
RewriteRule ^WP-ADMIN/LOAD-SCRIPTS\.PHP$ - f
add this to your .htaccess
## Impact
DoS of the site and application server
Related CVEs
Associated Common Vulnerabilities and Exposures
CVE-2018-6389
UNKNOWN
In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.
Report Details
Additional information and metadata
State
Closed
Substate
Informative