INSUBCONTINENT EXCLUSIVE:
Vulnerabilities have been discovered in a popular WordPress plugin called Popup Builder which could allow unauthenticated attackers to
inject malicious JavaScript code into popups in order to steal information and even potentially take full control over targeted sites.The
plugin gives site owners the ability to create, deploy and manage customizable popups using a range of different content from HTML and
JavaScript code to images and videos
Sygnoos, the developer of Popup Builder, says that businesses can utilize it to increase their sales and revenue through its smart popups
that can be used to display ads, subscription requests, discounts and other promotional content.The security flaws in the plugin, which
affect all versions of Popup Builder up to version 3.63, were first discovered by Ram Gall who works as a QA engineer at Defiant
attackers use a vulnerability like this to redirect site visitors to malvertising sites or steal sensitive information from their browsers,
though it could also be used for site takeover if an administrator visited or previewed a page containing the infected popup while logged
code into any published popup and the code would then be executed whenever it is loaded.The other vulnerability makes it possible for any
user that is logged in (with permissions as low as a subscriber) to gain access to plugin features to export subscriber lists and system
configuration info using a simple POST request to admin-post.php.The security flaws, tracked as CVE-2020-10196 and CVE-2020-10195, have both
been fixed by Sygnoos with the release of Popup Builder version 3.65.1, after Gall disclosed the bugs to the company.However, only 33,000
users of the plugin's 100,000+ users have updated to the latest version which means that over 66,000 sites with previous versions of Popup
Builder are still vulnerable and could be targeted by hackers.Via BleepingComputer