{"id":2797,"date":"2016-08-24T13:47:46","date_gmt":"2016-08-24T19:47:46","guid":{"rendered":"http:\/\/www.whitefirdesign.com\/blog\/?p=2797"},"modified":"2016-08-24T13:47:46","modified_gmt":"2016-08-24T19:47:46","slug":"its-scary-how-little-wordfence-knows-about-security","status":"publish","type":"post","link":"https:\/\/www.whitefirdesign.com\/blog\/2016\/08\/24\/its-scary-how-little-wordfence-knows-about-security\/","title":{"rendered":"It&#8217;s Scary How Little Wordfence Knows About Security"},"content":{"rendered":"<p>If you follow the news what seem pretty clear is that cybersecurity is not in good shape these days, whether it&#8217;s major credit card breaches at retailers or hacks of high profile organizations, clearly something is very wrong. It seems unlikely that is due to a lack of spending on security products and services, consider that estimates of yearly spending on cybersecurity are in the 10s of billions of dollars and expected to continue to rise. Instead part of the explanation is that much of that money is being spent on products and services from\u00a0companies that know and or care little about security.<\/p>\n<p>To give you one example,\u00a0anti-virus software from well known companies\u00a0<a href=\"https:\/\/www.wired.com\/2016\/06\/symantecs-woes-expose-antivirus-software-security-gaps\/\">Kaspersky Lab, Norton, McAfee, Sophos, and Trend Micro<\/a>\u00a0all were found by Google researcher Tavis Ormandy to have had exploitable vulnerabilities in them. When you have to be concerned that security products are increasing your security risk that indicates something is quite wrong. But what is more striking about those vulnerabilities is the ease of exploiting some of these and that they\u00a0were\u00a0due in part to the companies doing dumb things. For example, in the case of Norton, quite of few of their products, including enterprise products, were subject to a <a href=\"https:\/\/googleprojectzero.blogspot.com\/2016\/06\/how-to-compromise-enterprise-endpoint.html\">remote code execution vulnerability that could be exploited by sending an email<\/a> (it wouldn&#8217;t have had to be opened) that was due in part to running code at a higher privilege level than was have been needed.<\/p>\n<p>As we have ramped up our <a href=\"https:\/\/www.pluginvulnerabilities.com\/\">Plugin Vulnerabilities service for keeping track of vulnerabilities in WordPress plugins<\/a>, we have run across more of what WordPress security companies are up to and what is seen is that are not the exception when it comes to the poor state of security companies. One such example is Wordfence, we have frequently seen things that showed they either didn&#8217;t know or care much about security.<\/p>\n<p>What we have wondered for some time though, is it more that they don&#8217;t know about security or if they just don&#8217;t care about it. To see why that is, take their involvement in the widespread claim that <a href=\"http:\/\/www.whitefirdesign.com\/blog\/2016\/08\/02\/no-one-is-trying-to-brute-force-your-wordpress-admin-password\/\">brute force attacks against WordPress admin password are occurring, despite the fact the evidence from Wordfence and other security companies actual shows that they are not<\/a>. Does\u00a0Wordfence had no clue what they were talking about or\u00a0do they\u00a0know they were telling people a\u00a0falsehood to help push their product and service, seeing as those wouldn&#8217;t be needed if people knew what the malicious login attempts falsely being labeled as part of brute force attacks were most likely part of, dictionary attacks, which can be protected by simply using a strong password. We really were not sure.<\/p>\n<p>In another example, Wordfence made a bold claim about being able to protect against stored XSS attacks, which we <a href=\"https:\/\/www.pluginvulnerabilities.com\/2016\/06\/30\/wordfences-firewall-doesnt-protect-against-a-real-world-stored-xss-vulnerability\/\">found to be false<\/a> with <a href=\"https:\/\/www.pluginvulnerabilities.com\/2016\/07\/18\/wordfences-firewall-doesnt-protect-against-a-real-world-unauthenticated-stored-xss-vulnerability\/\">some simple testing<\/a>.\u00a0In that case it\u00a0could have either been that they were saying something they knew wasn&#8217;t true or it could have been that they understand so little about\u00a0this type of vulnerability\u00a0that they didn&#8217;t understand what incredible claim they were making and that they needed to be very careful about making it without being sure about the claiming.<\/p>\n<p>We think the latest\u00a0false information put forward them makes it pretty likely that they are lacking\u00a0a basic understanding of security, which is frightening since so much of the WordPress community\u00a0is relying on them for information and protection.<\/p>\n<p>In a <a href=\"https:\/\/www.wordfence.com\/blog\/2016\/08\/top-50-attacked-wordpress-plugins-week\/\">post<\/a> about what they say are the most\u00a0attack plugin vulnerabilities (worth mentioning here is that <a href=\"https:\/\/www.pluginvulnerabilities.com\/2016\/06\/24\/wordfences-real-time-threat-defense-feed-seems-to-be-missing-many-plugin-vulnerabilities\/\">we recently found that Wordfence seems to be oblivious to vulnerabilities in plugins that are actually the biggest threat<\/a>) they made a claim that we\u00a0and they found out surprising, that many of the vulnerabilities being targeted were local file inclusion (LFI) vulnerabilities:<\/p>\n<blockquote><p>The large number of local file inclusion vulnerabilities that are being exploited is surprising. I should also note that many of these LFI\u2019s were discovered by <a href=\"https:\/\/twitter.com\/_larry0\">Larry Cashdollar<\/a>who I had the pleasure of seeing speak at Defcon in Las Vegas\u00a02 weeks ago. So I suspect that many of these are being used in an attack script of some kind which may explain their prevalence in the attacks we\u2019re seeing.<\/p>\n<p>The clustering\u00a0of LFI\u2019s together and Shell exploits together in the list order is odd, but I don\u2019t have a theory to explain that and there is no error in the data that accounts for that. It appears to be coincidence.<\/p><\/blockquote>\n<p>Considering\u00a0that everything we know from monitoring plugin vulnerabilities and dealing with lots of hacked websites is that this type of vulnerability is rarely targeted, this seemed odd. But a quick look at the data they presented showed a simply explanation, local file inclusion vulnerabilities were not actually be targeted. Instead what was being targeted were what we refer to as arbitrary file viewing vulnerabilities (they are also often referred to arbitrary file download or directory traversal vulnerabilities), which are very different.<\/p>\n<p>Before we get in to what each of those type of vulnerabilities is, \u00a0it is worth mentioning that Wordfence really had to go out of their way to get this wrong, as\u00a0can easily seen by the fact that the first five vulnerabilities they listed as being local file inclusion vulnerabilities are actually listed in the linked to advisories as being the following types of vulnerabilities:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.exploit-db.com\/exploits\/37752\/\">Arbitrary File Download<\/a><\/li>\n<li><a href=\"https:\/\/www.exploit-db.com\/exploits\/35460\/\">File Disclosure Download<\/a><\/li>\n<li><a href=\"https:\/\/www.exploit-db.com\/exploits\/35378\/\">Arbitrary File Download<\/a><\/li>\n<li><a href=\"https:\/\/www.exploit-db.com\/exploits\/37751\/\">Aribtrary File Download<\/a><\/li>\n<li><a href=\"https:\/\/www.exploit-db.com\/exploits\/37530\/\">Arbitrary File Download<\/a><\/li>\n<\/ul>\n<p>Not one of those is listed as listed local file inclusion vulnerability, so Wordfence must have thought they were all wrong.<\/p>\n<p>A local file inclusion (LFI) vulnerability allows an attacker to <a href=\"http:\/\/php.net\/manual\/en\/function.include.php\">include<\/a>\u00a0a file that exists on the file system of the server the website is on (a remote file inclusion (RFI) vulnerability allows the same with a file that exists somewhere else). For\u00a0this type of vulnerability\u00a0to useful to a hacker they either need to be able to place a file on the website or there needs to be a file thats inclusion in this way causing a security issue. Since those do not appear to be readily available in most cases it follow that this type of vulnerability is not often being exploited.<\/p>\n<p>An arbitrary file viewing vulnerability allows viewing the contents of a file that exists on the website. With WordPress websites\u00a0we frequently see attempts to exploit this type of vulnerability to view the contents of the wp-config.php file.\u00a0If successful that would provide the attacker with the database credentials associated with the website. For that to be useful the attacker would need to be able to connect to the database, their ability to do that varies greatly depending on the hosting setup. While we see many attempts to exploit this type of vulnerability, we see it being the cause of a website being hacked much less than arbitrary file upload vulnerabilities, which we also see many exploit attempts against.<\/p>\n<p>While Wordfence&#8217;s lack of understanding what each of these vulnerabilities\u00a0would likely has some impact on protecting against them, it would have an even bigger impact on their properly doing hack cleanups (which they also offer) since it greatly helps\u00a0to understand what\u00a0security vulnerabilities have existed on the website to determine the source of the hack and the impact the exploitation of a vulnerability could have\u00a0had.<\/p>\n<p>If you care about security we would recommend you\u00a0help us get the\u00a0truth about Wordfence out to a wider audience so that together we can lessen the damage they are doing toward the security of so many websites.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you follow the news what seem pretty clear is that cybersecurity is not in good shape these days, whether it&#8217;s major credit card breaches at retailers or hacks of high profile organizations, clearly something is very wrong. It seems unlikely that is due to a lack of spending on security products and services, consider &hellip; <a href=\"https:\/\/www.whitefirdesign.com\/blog\/2016\/08\/24\/its-scary-how-little-wordfence-knows-about-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;It&#8217;s Scary How Little Wordfence Knows About Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[40],"class_list":["post-2797","post","type-post","status-publish","format-standard","hentry","category-bad-security","tag-wordfence"],"_links":{"self":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/2797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/comments?post=2797"}],"version-history":[{"count":4,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/2797\/revisions"}],"predecessor-version":[{"id":2801,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/2797\/revisions\/2801"}],"wp:attachment":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/media?parent=2797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/categories?post=2797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/tags?post=2797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}