{"id":2278,"date":"2015-01-13T16:00:25","date_gmt":"2015-01-13T23:00:25","guid":{"rendered":"http:\/\/www.whitefirdesign.com\/blog\/?p=2278"},"modified":"2015-01-13T16:00:25","modified_gmt":"2015-01-13T23:00:25","slug":"automattics-responsibility-for-the-security-of-wordpress-plugins","status":"publish","type":"post","link":"https:\/\/www.whitefirdesign.com\/blog\/2015\/01\/13\/automattics-responsibility-for-the-security-of-wordpress-plugins\/","title":{"rendered":"Automattic&#8217;s Responsibility for the Security of WordPress Plugins"},"content":{"rendered":"<p>As we have continued to refocus on the security of WordPress plugins due to our work on <a href=\"https:\/\/wordpress.org\/plugins\/plugin-vulnerabilities\/\">new plugin that warns of known vulnerabilities in WordPress plugins<\/a>\u00a0the question of who has a responsibility for improving the security of WordPress plugins has come up.\u00a0Relying on the developers of the plugins to insure they are secure doesn&#8217;t seem to be working as many of the vulnerabilities we have reviewed are things that are not the result of complex issues, so they could have been prevented with relatively basic security precautions. Since WordPress is a volunteer effort expecting that those volunteers would be responsible for the overall security of third-party software doesn&#8217;t see right. But what about the company closely connected with WordPress, Automattic? With a <a href=\"http:\/\/blogs.wsj.com\/venturecapital\/2014\/05\/05\/automattic-valued-at-1-16-billion-says-it-doesnt-need-ipo\/\">valuation of over billion dollars<\/a> they certainly have the financial wherewithal to bear the burden of some responsibility, but in the past we would have said no since they didn&#8217;t seem to have a direct connection with plugins, but as we recently stumbled upon\u00a0they are taking advantage of them for business purposes.<\/p>\n<p>Recently a <a href=\"http:\/\/packetstormsecurity.com\/files\/129749\/WordPress-Frontend-Uploader-0.9.2-Cross-Site-Scripting.html\">reflected cross-site scripting\u00a0(XSS)\u00a0vulnerability<\/a> was discovered in the\u00a0<a href=\"https:\/\/wordpress.org\/plugins\/frontend-uploader\/changelog\/\">Frontend Uploader plugin<\/a>. After confirming that the vulnerability existed in the most recent version we went looking for a way to contact the developer of the plugin to alert that the vulnerability existed in their plugin. While doing that we came across a page for the <a href=\"http:\/\/vip.wordpress.com\/plugins\/wp-frontend-uploader\/\">plugin at Automattic&#8217;s \u00a0Wordpress.com VIP<\/a>, a <a href=\"http:\/\/vip.wordpress.com\/our-services\/\">service<\/a> where you can pay starting amounts of $5,000 a month for hosting and $1,250 for support. It turns out they\u00a0<a href=\"http:\/\/vip.wordpress.com\/plugins\/\">offer\u00a0a number of the plugins<\/a> from the <a href=\"https:\/\/wordpress.org\/plugins\/\">wordpress.org Plugin Directory<\/a> to the customers of their VIP service. They tout those plugins (as partner integration) with this:<\/p>\n<blockquote><p>We&#8217;ve added 200+ extra features on top of WordPress for everyone on WordPress.com\u2014and just for VIPs, we&#8217;ve added the additional plugins below, which can be integrated into your sites with a single-click, so you can take advantage of powerful partner integrations and features without touching a line of code.<\/p><\/blockquote>\n<p>Their <a href=\"http:\/\/vip.wordpress.com\/why-vip\/\">marketing materials<\/a>\u00a0also touts their claimed security (which hopefully has improved\u00a0after the\u00a0<a href=\"http:\/\/techcrunch.com\/2011\/04\/13\/hacker-gains-access-to-wordpress-com-servers\/\">major breach they had a few years ago<\/a>):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2279\" src=\"https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2015\/01\/wordpress-com-vip-security.png\" alt=\"We stay awake at night, watching over your site, so you don\u2019t have to. Our site monitoring and secure codebase ensure an impressive uptime, and our operations team is always hands-on.\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2015\/01\/wordpress-com-vip-security.png 300w, https:\/\/www.whitefirdesign.com\/blog\/wp-content\/uploads\/2015\/01\/wordpress-com-vip-security-150x150.png 150w\" sizes=\"auto, (max-width: 300px) 85vw, 300px\" \/><\/p>\n<p>Based on all of this we certainly think that\u00a0Automattic has a responsibility for improving the security of WordPress plugins since they are getting benefit from them.<\/p>\n<p>If they are going to live up to that responsibility they have a lot of work to do, as can be seen in this case. After the vulnerability was disclosed in a plugin they are redistributing they don&#8217;t appear to have done anything about. As far as we can tell the vulnerability was only fixed after we\u00a0reported the vulnerability to the people running the WordPress.org Plugin Directory (since we couldn&#8217;t find a direct contact for the developers of the plugin) and them pulling the plugin pending a fix. While the plugin was gone from the Plugin Directory it was still listed on the WordPress.com VIP website, though we don&#8217;t know if they continued to distribute it.\u00a0It doesn&#8217;t even look as if people using WordPress.com VIP would know that the plugin had a vulnerability fixed since the <a href=\"http:\/\/vip.wordpress.com\/plugins\/wp-frontend-uploader\/changelog\/\">changelog<\/a> makes no mention of the new version, 1.9.3, or the security fix in it (which unfortunately is an <a title=\"Security Vulnerability Fixes Often Left Unmentioned In WordPress Plugin Changelogs\" href=\"http:\/\/www.whitefirdesign.com\/blog\/2014\/12\/16\/security-vulnerability-fixes-often-left-unmentioned-in-wordpress-plugin-changelogs\/\">all to common problem when plugins receive security fixes<\/a>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we have continued to refocus on the security of WordPress plugins due to our work on new plugin that warns of known vulnerabilities in WordPress plugins\u00a0the question of who has a responsibility for improving the security of WordPress plugins has come up.\u00a0Relying on the developers of the plugins to insure they are secure doesn&#8217;t &hellip; <a href=\"https:\/\/www.whitefirdesign.com\/blog\/2015\/01\/13\/automattics-responsibility-for-the-security-of-wordpress-plugins\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Automattic&#8217;s Responsibility for the Security of WordPress Plugins&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-2278","post","type-post","status-publish","format-standard","hentry","category-wordpress-plugins"],"_links":{"self":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/2278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/comments?post=2278"}],"version-history":[{"count":2,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/2278\/revisions"}],"predecessor-version":[{"id":2281,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/2278\/revisions\/2281"}],"wp:attachment":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/media?parent=2278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/categories?post=2278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/tags?post=2278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}