Stories
Slash Boxes
Comments

SoylentNews is people

posted by girlwhowaspluggedout on Thursday March 13 2014, @01:30PM   Printer-friendly
from the wordpress-is-the-devil's-playground dept.

Fluffeh writes:

"Researchers from security firm Sucuri recently counted more than 162,000 WordPress sites hitting a single website. This attack exploited the commonly used Pingback mechanism, which is in enabled by default in Wordpress. None of the sites involved, therefore, needed to be hacked to facilitate the DDoS.

By sending spoofed XML-RPC requests in a way that made them appear to come from the target site, the attacker was able to trick the WordPress servers into bombarding the target with more traffic than it could handle. The GET queries used to create the DDoS 'had a random value (like "?4137049=643182") that bypassed their cache and force a full page reload every single time.'

Unfortunately, Sucuri remarks that:

This is a well known issue within WordPress and the core team is aware of it, it's not something that will be patched though. In many cases this same issue is categorized as a feature, one that many plugins use, so in there lies the dilemma.

The only way for Wordpress site owners to discover if their websites are being used in DDoS attacks is to search their logs for POST requests to the XML-RPC file that generate a pingback to random URLs."

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by wantkitteh on Thursday March 13 2014, @01:39PM

    by wantkitteh (3362) on Thursday March 13 2014, @01:39PM (#15848) Homepage Journal

    ...what kind of amplification ratio this method achieves? I realize that's not really the intention, it's more about launching a DDoS without needing a botnet in place to start with, I'm just curious as to the attack bandwidth figures you'd get.

    • (Score: 5, Informative) by jdccdevel on Thursday March 13 2014, @02:09PM

      by jdccdevel (1329) on Thursday March 13 2014, @02:09PM (#15869) Journal

      The bandwidth amplification would be pretty high, it depends on the size of the page being requested. The request to the first server, and the target server are really small (less than 1kb). But the response from the target (to the intermediary) can easily be hundreds of times that size.

      The real issue with this attack isn't the bandwidth so much as it is the server processing time. The queries are structured such that the cache is bypassed, requiring each response to be generated specifically for that request. This would eat CPU like CRAZY (it is PHP after all), and bring the server to it's knees much quicker than the bandwidth use alone.

      • (Score: 2, Informative) by jdccdevel on Thursday March 13 2014, @02:24PM

        by jdccdevel (1329) on Thursday March 13 2014, @02:24PM (#15877) Journal

        Correction:

        The CPU side of the DOS attack will affect any site with a dynamically generated page, not just those running PHP.

      • (Score: 2) by Open4D on Friday March 14 2014, @10:18AM

        by Open4D (371) on Friday March 14 2014, @10:18AM (#16259) Journal

        So it's multiple Wordpress sites being used to DDOS a single target Wordpress site?

        Would one mitigating option be for the Wordpress devs to change the feature so that it is immediately clear to the targeted site when an incoming request has been triggered by a pingback rather than a normal user request, so that it can give priority to the latter?

  • (Score: 5, Informative) by drgibbon on Thursday March 13 2014, @02:04PM

    by drgibbon (74) on Thursday March 13 2014, @02:04PM (#15866) Journal

    Here's couple of plugins to guard against this:
    Disable XML-RPC [wordpress.org].
    Disable XML-RPC pingbacks [wordpress.org].

    Just disabling pingbacks is the way to go if you use Jetpack [wordpress.org] or anything else that needs XML-RPC.

    --
    Certified Soylent Fresh!
    • (Score: 5, Informative) by WizardFusion on Thursday March 13 2014, @02:41PM

      by WizardFusion (498) on Thursday March 13 2014, @02:41PM (#15889) Journal

      Yes, I disabled XML-RPC and the pingback option on my site. It was listed as good security practice a few years ago when I got started.

      • (Score: 4, Insightful) by halcyon1234 on Thursday March 13 2014, @04:11PM

        by halcyon1234 (1082) on Thursday March 13 2014, @04:11PM (#15942)

        What the hell is the point of a pingback anyways?

        --
        Original Submission [thedailywtf.com]
        • (Score: 1) by fnj on Thursday March 13 2014, @06:03PM

          by fnj (1654) on Thursday March 13 2014, @06:03PM (#16012)

          I don't understand it either. Somebody please explain what it is FOR.

          • (Score: 1) by drgibbon on Thursday March 13 2014, @10:08PM

            by drgibbon (74) on Thursday March 13 2014, @10:08PM (#16097) Journal

            Never used them myself, but kind of like remote commenting, according to this [wpbeginner.com].

            --
            Certified Soylent Fresh!
        • (Score: 3, Insightful) by chromas on Thursday March 13 2014, @10:36PM

          by chromas (34) Subscriber Badge on Thursday March 13 2014, @10:36PM (#16108) Journal

          The pingback system is a safeguard against readers.

          Imagine you have a web site where you post an article and then people write comments on it. That's no good, right? Well, with pingback, you can intersperse those comments with links to other websites that link back to the page you're already on!

  • (Score: 5, Funny) by skullz on Thursday March 13 2014, @03:11PM

    by skullz (2532) on Thursday March 13 2014, @03:11PM (#15905)

    In many cases this same issue is categorized as a feature

    Microsoft, is that you?

  • (Score: 4, Funny) by sharky on Thursday March 13 2014, @04:02PM

    by sharky (572) on Thursday March 13 2014, @04:02PM (#15933)

    I'm not even mad - That's genius.

  • (Score: 4, Funny) by elf on Thursday March 13 2014, @05:20PM

    by elf (64) on Thursday March 13 2014, @05:20PM (#15994)

    someone just trying to get their hit count up on their blog.