Slide 1

Slide 1 text

Security with WordPress WordPress Singapore

Slide 2

Slide 2 text

Made possible by [ 2 ]

Slide 3

Slide 3 text

Topics Today • Talk: Pressing On – Jon Ang • WordPress Security – Jon Ang • Community Open Space – Everyone [ 3 ]

Slide 4

Slide 4 text

• Misconceptions • Understanding Vulnerabilities • Best Practices [ 4 ]

Slide 5

Slide 5 text

Misconception: WordPress is insecure

Slide 6

Slide 6 text

No content

Slide 7

Slide 7 text

No content

Slide 8

Slide 8 text

No content

Slide 9

Slide 9 text

WordPress is 100% secure if you take it offline

Slide 10

Slide 10 text

WordPress is as secure as your plugins, theme and hosting combined

Slide 11

Slide 11 text

Choice Old Version Bad Hosting Password Theme / Plugin

Slide 12

Slide 12 text

Types of Vulnerabilities

Slide 13

Slide 13 text

Types • CSRF (Cross-Site Request Forgery) • XSS (Cross-Site Scripting) • SQLI (SQL Injection) • And more • Examples provided by George Stephanis [ 13 ]

Slide 14

Slide 14 text

CSRF • Cross-Site Request Forgery attacks involve malicious websites attempting to forge legitimate requests, often from a different site. • Can your code tell the difference between • • and • [ 14 ]

Slide 15

Slide 15 text

CSRF • How do we know the submission is legitimate? • We check for something that only we can provide — a nonce. • NONCE: Number used ONCE. • Nonces in WordPress are valid for 12–24 hours, and are generated from: • the current 12 hour tick, • the action name, • the current user’s ID, • their session token. • It also leverages the unique generated strings in wp-config.php for security. [ 15 ]

Slide 16

Slide 16 text

CSRF • Revisiting our previous example: • + → • The rotating nonce cannot be anticipated. • • ALSO: Nonces are for intent, not for authentication! They are for validating that the user intended to do an action. Always also check against user caps. [ 16 ]

Slide 17

Slide 17 text

XSS • Cross-Site Scripting means — in short — that some villain can sneak malicious javascript code into your site, and trick you into running the script. • Anything* you can do, it can do too! • * (nearly) [ 17 ]

Slide 18

Slide 18 text

XSS •
• But what about … • /page?id=X">alert('XSS');<" • Becomes … •
alert('XSS');<""> [ 18 ]

Slide 19

Slide 19 text

XSS [ 19 ]

Slide 20

Slide 20 text

XSS •
• Again, if we try … • /page?id=X">alert('XSS');<" • This time, it becomes … •
[ 20 ]

Slide 21

Slide 21 text

XSS • It does a lot more than cause alerts. • It can load up admin pages, extract nonces, and spoof form submissions. • It can use the Plugin and Theme Editor in the admin to write nasty PHP code to your server. • It can change your password without your knowledge. • It can create a new Administrator account for itself. • It can install new plugins and themes. • It can inject malware links and embeds into your posts. [ 21 ]

Slide 22

Slide 22 text

XSS • Cross-Site Scripting isn’t all-powerful. • Anything that you need to re-authenticate for, it can’t spoof. #31779-core • Anything the currently logged in user can’t do, XSS can’t either. • This is why folks recommend creating yourself an Author or Editor account for every day use, and not doing everything as Administrator. • Rule of : If a sitting at your can do it, so can XSS. ! [ 22 ]

Slide 23

Slide 23 text

SQLi • SQL Injection lets attackers shoehorn tricky code into existing database calls. • SELECT * FROM `wp_posts` WHERE `slug` = '{$value}' LIMIT 1; • // $value = "foo" SELECT * FROM `wp_posts` WHERE `slug` = 'foo' LIMIT 1; • // $value = "x'; UPDATE `wp_users` SET `user_email` = 'h@ck.er' WHERE `ID` = 1; --" • SELECT * FROM `wp_posts` WHERE `slug` = 'x'; • UPDATE `wp_users` SET `user_email` = 'h@ck.er' WHERE `ID` = 1; • -- LIMIT 1; [ 23 ]

Slide 24

Slide 24 text

SQLi • So what can SQL Injection do? • DROP (delete) all of the tables in your database. • INSERT new users, posts, etc. • DELETE users, posts, meta. • UPDATE (change) user info, passwords, roles. • Getting access to an Administrator user (either by creating a new one or changing the password of an existing) is normally game over. [ 24 ]

Slide 25

Slide 25 text

SQLi • ! This code is a simplified version of real code that was once in use by a popular plugin (that shall remain nameless). It is insecure. Do not use it. • $orderby = 'post_title'; $order = 'ASC'; if ( ! empty( $_GET['orderby'] ) { $orderby = esc_sql( sanitize_text_field( $_GET['orderby'] ) ); } if ( ! empty( $_GET['order'] ) ) { $order = esc_sql( strtoupper( sanitize_text_field( $_GET['order'] ) ) ); } $wpdb->get_col( "SELECT `ID` FROM {$wpdb->posts} ORDER BY {$orderby} {$order} LIMIT 10" ); • We’re fetching posts and letting the user change the sorting. • Fairly harmless? #nopenopenope [ 25 ]

Slide 26

Slide 26 text

SQLi • But what do the functions do? –sanitize_text_field(): Checks for invalid UTF-8, Convert single < characters to entity, strip all tags, remove line breaks, tabs and extra white space, strip octets. • Not really useful (or relevant) to us here. –esc_sql(): Prepares a string for use as an SQL query. This function is a glorified addslashes() that works with arrays. • esc_sql() is also deprecated in favor of using $wpdb->prepare(). It will escape single quotes in values, but as ORDER and ORDERBY aren’t escaped in the query, in this case it’s useless. [ 26 ]

Slide 27

Slide 27 text

SQLi • Sometimes generic functions aren’t enough. • We can fix the prior example by whitelisting values: • $orderby = 'post_title'; $order = 'ASC'; $orderbys = array( 'slug', 'id', 'post_date' ); if ( isset( $_GET['orderby'] && in_array( $_GET['orderby'], $orderbys ) ) { $orderby = $_GET['orderby']; } if ( isset( $_GET['order'] ) && 'DESC' === strtoupper( $_GET['order'] ) ) { $order = 'DESC'; } $wpdb->get_col( "SELECT `ID` FROM {$wpdb->posts} ORDER BY {$orderby} {$order} LIMIT 10" ); [ 27 ]

Slide 28

Slide 28 text

SQLi • The `$wpdb->prepare()` method will take your data, escape it, and then pop them into your query. • $wpdb->prepare( "SELECT * FROM `table` WHERE `str` = %s AND `num` = %d;”, "Sonny's", 3 ); • Becomes… • SELECT * FROM `table` WHERE `str` = 'Sonny\'s' AND `num` = 3; • But you can’t use prepare with order / orderby arguments as they’re not quoted in the query. [ 28 ]

Slide 29

Slide 29 text

Few ways to avoid this • Developers – There are not many use-cases to write your own SQL code – Use WordPress’ Classes, Objects and Queries • Eg. Use WP_Query instead of writing your own SQL line • Users – Ask your developers to use native WordPress functions [ 29 ]

Slide 30

Slide 30 text

Take-away • Developers – Don’t trust user input • Users – Ask developers if they have taken appropriate CSRF, XSS, SQLi preventions – Like asking your local butcher if the meat has been through AVA checks [ 30 ]

Slide 31

Slide 31 text

Best Practices

Slide 32

Slide 32 text

Best Practices • Keep Upgrading • Checking for intent • Sanitising • Escaping • Check for user capabilities • Whitelisting [ 32 ]

Slide 33

Slide 33 text

Keep Upgrading

Slide 34

Slide 34 text

User Woe [ 34 ]

Slide 35

Slide 35 text

Response [ 35 ]

Slide 36

Slide 36 text

Result [ 36 ]

Slide 37

Slide 37 text

[ 37 ]

Slide 38

Slide 38 text

Love your users, but don’t trust them

Slide 39

Slide 39 text

Sanitisation • Sanitise Early – Because variables can be passed around at any time, sanitise early so you know it’s clean, because other functions that make use of your variable may not have cleaning lines • Understand your content – What content do you want? • Functions – intval() – sanitize_text_field() – https://codex.wordpress.org/Validating_Sanitizing_and_Escaping_User_Data [ 39 ]

Slide 40

Slide 40 text

Escaping • Escape late – Variable can be used to output to different context – Different context requires different code • Understand the context – What is it going to be used for? • Functions – esc_url – esc_html – https://codex.wordpress.org/Validating_Sanitizing_and_Escaping_User_Da ta [ 40 ]

Slide 41

Slide 41 text

SSL • Without https [ 41 ]

Slide 42

Slide 42 text

SSL • With https [ 42 ]

Slide 43

Slide 43 text

SSL • Has a huge advantage – Allows HTTP/2 and SPDY – Secured sites are ranked higher by Google – Fast sites are ranked higher too [ 43 ]

Slide 44

Slide 44 text

Reporting Security Exploits

Slide 45

Slide 45 text

Escaping • Plugins – Contact the plugin author • Especially if it’s a non WordPress.org plugin – Contact plugins@wordpress.org • Themes – Contact the theme author • WordPress Core – Contact security@wordpress.org [ 45 ]

Slide 46

Slide 46 text

No content