Researchers find backdoor lurking in WordPress plugin used by schools

Front page layout
Site theme
Sign up or login to join the discussions!

Researchers said on Friday that they found a malicious backdoor in a WordPress plugin that gave attackers full control of websites that used the package, which is marketed to schools.
The premium version of School Management, a plugin schools use to operate and manage their websites, has contained the backdoor since at least version 8.9, researchers at website security service JetPack said in a blog post without ruling out that it had been present in earlier versions. This page from a third-party site shows that version 8.9 was released last August.
Jetpack said it discovered the backdoor after support team members at WordPress.com reported finding heavily obfuscated code on several sites that used School Management Pro. After deobfuscating it, they realized that the code, stashed in the license-checking part of the plugin, was intentionally placed there with the goal of giving outsiders the ability to take control of sites.
“The code itself isn’t all that interesting: it’s an obvious backdoor injected into the license-checking code of the plugin,” the JetPack post said. “It allows any attacker to execute arbitrary PHP code on the site with the plugin installed.”
In its obfuscated form, the code looked like this:
After deobfuscation, the code was:
Researchers wrote a proof-of-concept exploit that confirmed the obfuscated code was indeed a backdoor that allowed anyone with knowledge of it to execute code of their choice on any site running the plugin.
It’s not clear how many sites use the plugin. Weblizar, the India-based maker of School Management, says on its homepage that it has “340k+” customers for its free and premium themes and plugins, but the backdoor JetPack found was only in School Management Pro. The backdoor wasn’t in the free version of the plugin, and there’s no indication it was put into other plugins Weblizar publishes.
“We have tried to get more information from the vendor about when the backdoor was injected, what versions are affected, and how the code ended up in the plugin in the first place,” the post said. “This effort has been unsuccessful, as the vendor says they do not know when or how the code came into their software.”
Attempts to reach Weblizar weren’t successful.
Now that the presence of the backdoor is public knowledge, attackers are likely to exploit it on any website using a vulnerable version of the plugin. Anyone who uses this plugin should update immediately. Even after patching, they should also carefully scan their site for signs of compromise, since the update won’t remove any new backdoors that may have been added.
You must to comment.
Join the Ars Orbital Transmission mailing list to get weekly updates delivered to your inbox.
CNMN Collection
WIRED Media Group
© 2022 Condé Nast. All rights reserved. Use of and/or registration on any portion of this site constitutes acceptance of our User Agreement (updated 1/1/20) and Privacy Policy and Cookie Statement (updated 1/1/20) and Ars Technica Addendum (effective 8/21/2018). Ars may earn compensation on sales from links on this site. Read our affiliate link policy.
Your California Privacy Rights | Do Not Sell My Personal Information
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast.
Ad Choices

source

Leave a Reply

Your email address will not be published.

© 2022 AI Caosuo - Proudly powered by theme Octo