CleanTalk Plugin Vulnerabilities Affect Over 200,000 WordPress Websites at Risk of Attack

CleanTalk Plugin Vulnerabilities Affect Over 200,000 WordPress Websites at Risk of Attack

Information:

The Spam Protection, Anti-Spam, FireWall plugin by CleanTalk is a comprehensive and effective solution for spam prevention on WordPress websites, widely popular and trusted by users worldwide. The plugin's key feature is its ability to prevent spam across multiple channels, such as comments, user registrations, contact forms, and WooCommerce forms. All of this can be achieved with a single plugin, eliminating the need to install additional plugins for each form type, which helps simplify website system management.

Incident:

The vulnerabilities CVE-2024-10542 and CVE-2024-10781 in the Spam Protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress are rated as critical (CVSS 9.8) as they allow unauthenticated attackers to gain complete system control. In CVE-2024-10542, the vulnerability stems from an Authorization Bypass where functions related to Remote Calls management and plugin installation lack proper permission checks. This allows attackers to use IP Spoofing and DNS Spoofing techniques to trick the system into treating connections as coming from trusted sources, enabling unauthorized plugin installation and management.

CVE-2024-10781 arises from a token verification method that uses Hash Comparison with an API Key. If a website hasn't configured an API Key within the plugin, the system accepts tokens matching an "Empty Hash," allowing attackers to successfully authenticate themselves. This vulnerability makes it easier for attackers to install and activate vulnerable plugins or malicious code, such as plugins designed to facilitate Remote Code Execution (RCE).

Recommendation:

  - Update the plugin immediately to version 6.45 or newer

  - Verify API Key configuration in the plugin to prevent authentication issues

  - Use a Web Application Firewall (WAF) to protect against spoofing attacks

  - Monitor and audit plugin changes or unauthorized system access

 

The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
0613879439 (Ms.Sirilak)
0922576902 (Ms.Narusorn)

References :

  - https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html

  - https://nvd.nist.gov/vuln/detail/CVE-2024-10542

  - https://nvd.nist.gov/vuln/detail/CVE-2024-10781

  - https://th.wordpress.org/plugins/cleantalk-spam-protect/

Weekly Interesting CVE

NO.

CVE Name

Published Date

Last Update

Device/Appplication/OS Target

Attack Type

CVSS
Severity Rating

Detail

Solution

Reference

1

CVE-2024-45422

19/11/2024

19/11/2024

Zoom

Improper Input Validation

6.5

Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.

Updated Version 6.2.0

https://nvd.nist.gov/vuln/detail/CVE-2024-45422

2

CVE-2023-29382

7/6/2023

19/11/2024

Zimbra Collaboration

Code Injection

9.8

An issue in Zimbra Collaboration ZCS v.8.8.15 and v.9.0 allows an attacker to execute arbitrary code via the sfdc_preauth.jsp component.

Updated Version 8.8.15 Patch 41
Updated Version 9.0.0 Patch 33

https://nvd.nist.gov/vuln/detail/CVE-2023-29382

3

CVE-2024-39709

12/11/2024

23/11/2024

Ivanti Connect Secure
Ivanti Policy Secure

escalate their privileges

7.8

Incorrect file permissions in Ivanti Connect Secure before version 22.6R2 (Not Applicable to 9.1Rx) and Ivanti Policy Secure before version 22.7R1 (Not Applicable to 9.1Rx) allow a local authenticated attacker to escalate their privileges.

Ivanti Connect Secure Updated Version 22.6R2
Ivanti Policy Secure Updated Version 22.7R1

https://nvd.nist.gov/vuln/detail/CVE-2024-39709

4

2024-44308

19/11/2024

21/11/2024

Safari

arbitrary code execution

8.8

The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.

iPhone Updated Version iOS 18.1.1 and iOS 17.7.2
Ipad Os Updated Version iOS 18.1.1 and iOS 17.7.2
Macos Updated Version 15.1.1
Safari Updated Version 18.1.1
Apple Vision Pro Updated Version 2.1.1

https://nvd.nist.gov/vuln/detail/CVE-2024-44308

5

CVE-2024-34406

6/11/2024

22/11/2024

McAfee Security: Antivirus VPN for Android

Improper exception handling

5.3

Improper exception handling in McAfee Security: Antivirus VPN for Android before 8.3.0 could allow an attacker to cause a denial of service through the use of a malformed deep link.

Updated Version 8.3.0

https://nvd.nist.gov/vuln/detail/CVE-2024-34406

Malware News or Campaign IOC/IOA | EN

No

Campaign Name

Detection Date

Attack

Type

 

Description

 

Mitigation/Remediation

1

Russian Hackers ​

Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia

22/11/2024​

Cyber Attack,​

Rejetto HTTP File Server,​

Phishing​

The TAG-110 threat group, associated with Russia, has been conducting cyber espionage campaigns targeting countries in Central Asia, East Asia, and Europe. The group primarily uses two custom malware tools:​

  • ​HATVIBE: A loader to deploy CHERRYSPY​
  • CHERRYSPY: A Python-based backdoor for data exfiltration and espionage​

        The primary targets include government entities, human rights organizations, and educational institutions. At least 62 victims across 11 countries have been identified, with a focus on Central Asia (e.g., Tajikistan, Kyrgyzstan, Kazakhstan, Turkmenistan, Uzbekistan), along with Armenia, China, Hungary, India, Greece, and Ukraine.​

        Attack chains leverage vulnerabilities in public-facing applications (e.g., Rejetto HTTP File Server) and phishing emails as entry points.​

  • Patch vulnerabilities: Update systems and applications to mitigate exploited vulnerabilities.Prevent.
  • phishing: Implement effective email filtering and educate employees on phishing risks.​
  • Deploy malware defenses: Use advanced security solutions to block malware downloads and execution.​
  • Monitor systems: Conduct traffic and log analysis to detect and respond to potential breaches.​

Ref: https://thehackernews.com/2024/11/russian-hackers-deploy-hatvibe-and.html

06 December 2024

Viewed 287 time

Engine by shopup.com