[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] DoS via tables corruption in WordPress
- To: <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: [Full-disclosure] DoS via tables corruption in WordPress
- From: "MustLive" <mustlive@xxxxxxxxxxxxxxxxxx>
- Date: Mon, 10 Feb 2014 15:02:51 +0200
Hello participants of Mailing List.
There is DoS vulnerability in WordPress, about which I wrote in 2009
(http://websecurity.com.ua/3152/, on English
http://perishablepress.com/important-security-fix-for-wordpress/comment-page-5/#comment-71666),
which allows to conduct DoS attack or reinstall of the engine (depending on
corrupted table). And in 2012 (http://websecurity.com.ua/5774/, on English
http://securityvulns.ru/docs27968.html) I wrote that developers hadn't fixed
it, even they said so, and they made new DoS vulnerability.
In April 2012 I wrote my article "Attack via tables corruption in MySQL"
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2012-May/008363.html)
and in July made English version of the article
(http://websecurity.com.ua/articles/attack-via-tables-corruption-in-mysql/).
Where I described vulnerabilities in WordPress and IPB which are based on my
conception of attack via tables corruption.
On Saturday I published a video with my WordPress DoS exploit
(http://www.youtube.com/watch?v=kwv5ni_qxXs), which shows this DoS attack on
one security site on WordPress. Vulnerable are all versions of WordPress.
This video is a proof of this vulnerability in WP and of the attack
described in the article.
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/