[WordPress Security] Multiple Vulnerabilities Patched in Quick Restaurant Menu Plugin

From: Wordfence <list_at_wordfence.com>
Date: Wed, 1 Feb 2023 10:13:36 -0800

Vulnerabilities included access control issues that could potentially be used to take down a site as well as XSS and CSRF

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVm3pdqSV1-WJV7CgRCvW1_lCG83mSbV2W53FCGb6WGFzZW1Jq9_c8nyMxNW4bZL5m7Pkf6FW53W5l04Bjyr-W2qv8S35ypq8sW63h8vg54tsNhW4Z7PvQ2F3sv0W4HQP5Y4lfSMnW2WqgP13nKBHVW6sfwnH1bQQV-W1FM66X739L5KW8qn7hr1J0DCbW7gPBGc7xFGY-MDn9pCYxtyHW4x-jtk50-JR6W5CvYxH97tmZVW1h_YWk1-NH2LVW3PGg4wV_SzW6y89Ds82yq9V34Qt1 )

Quick Restaurant Menu Blog Post (2) (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWS3pdskV1-WJV7CgYchW73X45V2pRqqvW5MdjHN424ThxW1tkJlQ4_bVPtW2__nz284gRfLW88GZB45pTthXW1l030l3ZRkSSW80gdjD2gsGMlW15fMWZ612RgjW1l-dJQ3NN9KmV2-tLj60tGJbW45HHML47nCs8W68tY2d2Kn5t2W3WNH6z7zz6TRVqm5Lh5Lql5wVzpC-z6g3w-pW5c9GT-9j0xqqW2BpPfq2VPH_JW4ZHx8x21ylRXW2XLDkp6nRl9BW9lv8N64RzQdmW76ZFks2hW24ZW3kB59y2YrLKkW2tYZ6d7nt7wtW7rSW9m7yNlWgVzYMtd8LFLyxW1MVxxy7VDCnTW31Z7PG2VWLw4W7vvCBd3TGv6SW6pXXNC3G00f2W5R9Rnb7ZMW1b3lwz1 )

On January 16, 2023, the Wordfence Threat Intelligence team responsibly disclosed several vulnerabilities in Quick Restaurant Menu, a WordPress plugin that allows users to set up restaurant menus on their sites. This plugin is vulnerable to Missing Authorization, Insecure Direct Object Reference, Cross-Site Request Forgery as well as Cross-Site Scripting in versions up to, and including 2.0.2.

We found that contact information was not readily available for the vendor, so we reached out to the WordPress Plugin Security Team team directly on January 16, 2023 to report the security issues. The team acknowledged receipt of our email on January 18, 2023. All issues were addressed in version 2.1.0, which was released on January 20, 2023. Unfortunately, the plugin is still closed for downloads at this point, so we recommend manually downloading the patched version, or uninstalling the plugin completely until the plugin has been reinstated.

We released a firewall rule addressing the lack of authorization checks on January 16, 2023. Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgDzJW82X0Cg5G8FqqW6T02KS1ywJRwN5YVM22ZpGK-W7JMSq32Br-09W1G-x2K1PnfP5W4Tb3ZQ3yKTLpW7X9Hqs4HXdmhW2LLXC83qbXbpW1JVw-D4rc2s6W5GrXTt42zL1ZW7D0BmC4bCBG6N720tgG4xb8FN3pZ5Ygh1Mt3W8mMpHy8Syx2GW4jDkYH7K9CWzW7QL7Lr67TLqdW1_0bJR2Hn-bgW5l26KN1v74lsW8RF1Jh6zL854W4qn_RJ3SJmZMW2lGlTr7Sg-YBW7jtCtg42vprqW4DjS0K4cRVZmW60MXf22FQ5zD32MM1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgzY5W8SkHwB95t3HQW3HFsvZ8c2KL7W4tp-H14cJJgTW8cY5zV8wQr4BVSY9tf5HQcQkW2JKQpv5tgCprW4-dq9Y8xc-mNW4gTBhS4FqF2sVvnYvH6ykW1-N1T4hl46vb0GW5_zbJH450XyjW5jQBqY7bbH1cW2nTTSF1pN04hN372nddW_YhVW49LKt31SB-mdW18STf76zC-kzW2r-Ss12__wKVW80kHPp4WKgdJN4f8q1LwQ8z3N5q4yWkGSRkZW4J_ysN5TGfvQW8B3PkL5hHBD-W7pYbQK2ySJCNW5LxWL_4xTL7j37yq1 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgYY9N41PdCwymsv3N5k_vSZY1CwQMlY77DLFDxKW1g1VmQ7D6fhKW4wxXcC4jxWPjW6LVTcZ1D8wPrW8-k-pp40s_YcN4JJp033J4fKW7Ck6MG95l9xsW7bqBl22wD0tBW5YcWbS4lz0SPW362TsK76TBS2W1G-0sM5MF38fN3f4_j4YtlCFW3s_fzq4fh9hQV_YwlJ4njNPcW5qswxp3bBSpwW2qhfSK7KChqSVgFdw_3wqQcFW2MVkGr4YPgq3N93zNKBPtkt0W26YTqz7gsJ9BW65SqS07HDTDzW1c8nkY5-3YT_3bj31 ) customers received that protection the same day, while sites still running the free version of Wordfence will receive the same protection 30 days later on February 15, 2023.

Due to the nature of Cross-Site Request Forgery vulnerabilities, which involve tricking administrators into performing actions they are allowed to perform, it is not possible to provide full protection without blocking legitimate requests. As such, we recommend updating as soon as possible to ensure that your site is fully protected against any exploits that may target the Cross-Site Request Forgery vulnerability.

This email content has also been published on our blog and you're welcome to post a comment there if you'd like to join the conversation. (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWS3pdskV1-WJV7CgYchW73X45V2pRqqvW5MdjHN424ThxW1tkJlQ4_bVPtW2__nz284gRfLW88GZB45pTthXW1l030l3ZRkSSW80gdjD2gsGMlW15fMWZ612RgjW1l-dJQ3NN9KmV2-tLj60tGJbW45HHML47nCs8W68tY2d2Kn5t2W3WNH6z7zz6TRVqm5Lh5Lql5wVzpC-z6g3w-pW5c9GT-9j0xqqW2BpPfq2VPH_JW4ZHx8x21ylRXW2XLDkp6nRl9BW9lv8N64RzQdmW76ZFks2hW24ZW3kB59y2YrLKkW2tYZ6d7nt7wtW7rSW9m7yNlWgVzYMtd8LFLyxW1MVxxy7VDCnTW31Z7PG2VWLw4W7vvCBd3TGv6SW6pXXNC3G00f2W5R9Rnb7ZMW1b3lwz1 ) Or you can read the full post in this email.

Vulnerability Summaries

Description: Missing Authorization to Arbitrary Post Deletion (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWy3pds1V1-WJV7CgLHdW2ChMLc7bmfFQW6T69pW4D8S7vVmDQjg2VmrCKW1dZnZk2ZKNCmVXD9r65c0wDgW83dk1D3YM5q9W8Q1tL47GtJt6W451jj26RphLfN952Lgx7XbN3W7glGqs3YsVBZW3CMN0v23YvQCW2brf7Z13l4v4W7kVzgv4lh-xDN1f9RB_Yg5WVW8Szhyq6YnBHKVQTbZ96yNRRyW213G-z1kf7r3Vd1Kds7_lq9sW6M1PC54vrQT-W2Cw9NC90HfpDN6-zZ4N1Zld2W6PBKG88wSlkMW51HRd796h6pRMJwJvW2k7YpW6-5lgH6xnN0FN3Rrpjvg29yyW67_vxb4CBJdnW7v6KZ14DymFB3hlQ1 )

Affected Plugin: Quick Restaurant Menu

Plugin Slug: quick-restaurant-menu

Affected Versions: <= 2.0.2

CVE ID: CVE-2023-0555

CVSS Score: 8.1 (High)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Researcher/s: Marco Wotschka (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWy3pds1V1-WJV7CgN-NW96F_dd8vx1-tW8pMx609j1BCTN50WwQsjxn36W8gjZFr1__gCVW4xQQB84jMm--W3zg2m459PcDFW24Pt-N3NtTkZW55NL851gZVv7MzXgVjLmD6WW7Cv2L87D47MfW1yTMsg1xBx2xW65Wt5h5k-kdXW6vvzR036QgbQMZpRcQJmC1DN7k3pGJHf-N5W1HDJsT3tNR99N57gQfwb0th6N38WNd8h7k_kMHKnVHwPVpgW70vM8c1ZjgWzW9jr7rZ4F119gW72WKJ741CH3HN1hg774YT0MyN8PSn8xtM3MGW8rHJxR18v6BlW1rwQqk4hpfW1W4GzNYh2LdCMLW5FlhM_3pmQxr3kbD1 ) , Ivan Kuzymchak (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWy3pds1V1-WJV7CgFp2M3rlFTkN1s5W8KvbD598v80wW2s6LjY7ZZYHTW4TL0cQ26hyN-W7jNxJ057pyfrVQyyGw1LpNg4W3PcRyD1gzrcrW86WmzJ1Jn2JgW7v9tWM4Dj3XVW1P86tP54F2lDN7PyydRg0zdCVshZRc8d9wdfW3gR0HM5SqKLjVSzhCP3pqxJTW6z1BX02_81xFW7FTTWh7dsBg-V2jtFb6V3VhNW6VHM1h6t7kxfW3rhRfV7ttQP_W15Gy4v2NwZ9BW58NPGx8JVfTqW4vW5mz7sq--gW8pNxPN7MzNBBV9nJjR8Mg72xW1K1Pyb7dLTC9W4wQGx96WjMKlW4MP0dy1c1xTPW19VjTr6vm8Gr33ql1 )

Fully Patched Version: 2.1.0

The Quick Restaurant Menu plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those actions intended for administrator use. Actions include menu item creation, update and deletion and other menu management functions. Since the plugin does not verify that a post ID passed to one of its AJAX actions belongs to a menu item, this can lead to arbitrary post deletion/alteration.

Description: Insecure Direct Object Reference (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVm5mNY1V3Zsc37CgYZNMqk4gC1Q89GW2F1QsV6s_pcgW3XY6gf955FQXW4qJZ-f6h6lqfW89RGdM1jbb5NW5qmzwx8TC7g5Vrdc6V8RxClzW63lJhV1b0B27W3GqBGl3gbwsWW3WyTnG1yR4H1W3s_9ss73wx-5W6GrkPL8cMcRgW5M9Jwm7wMWsFVwCn084F3PfhW3-B-F82sprNfW58vMrW3JdTmPW7_B64z6lwFSJW2yPsZn1g5FNfW4hjDjq34wG5pW6gYJC-7y8FMVW8YTFFz57BD1DN5s0VDrPpc35W2rllwr5ympq2W1Rqmyc2pxLmrW8-KZ0Z6f8hQcN8W9-lCJT7xQW4__w0Y2C5cQBW5Hhq_C6hFzhhW5p4pQs9645Y0W50SgfF1JTzYDW1rXr8H2_-BgQN8Kq9TCXY1G5W5gM41j7Y0PbzW5fXsLR8BC_RHW90zGnp3M9lTCVbZTgK47dVxX2VH1 )

Affected Plugin: Quick Restaurant Menu

Plugin Slug: quick-restaurant-menu

Affected Versions: <= 2.0.2

CVE ID: CVE-2023-0550

CVSS Score: 8.1 (High)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Researcher/s: Marco Wotschka (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWy3pds1V1-WJV7CgN-NW96F_dd8vx1-tW8pMx609j1BCTN50WwQsjxn36W8gjZFr1__gCVW4xQQB84jMm--W3zg2m459PcDFW24Pt-N3NtTkZW55NL851gZVv7MzXgVjLmD6WW7Cv2L87D47MfW1yTMsg1xBx2xW65Wt5h5k-kdXW6vvzR036QgbQMZpRcQJmC1DN7k3pGJHf-N5W1HDJsT3tNR99N57gQfwb0th6N38WNd8h7k_kMHKnVHwPVpgW70vM8c1ZjgWzW9jr7rZ4F119gW72WKJ741CH3HN1hg774YT0MyN8PSn8xtM3MGW8rHJxR18v6BlW1rwQqk4hpfW1W4GzNYh2LdCMLW5FlhM_3pmQxr3kbD1 )

Fully Patched Version: 2.1.0

The Quick Restaurant Menu plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the fact that during menu item deletion/modification, the plugin does not verify that the post ID provided to the AJAX action is indeed a menu item. This makes it possible for authenticated attackers, with subscriber-level access or higher, to modify or delete arbitrary posts.

Description: Cross-Site Request Forgery (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVm5mNY1V3Zsc37CgKbVW21bYRS8f4vSfN7WJW3bwgNTGW59JpCw5Sn6XKW7wRXJ64F84TMW8pvyKQ2rlpV8W1-MGCR8WWT5_W7vmLWg1LdwMGW602b3M2TVM-dW12-dHS7h_znPW1V0r0w76xphlW19f93D6ynFTqW4rpnyj4_zQ_JW2_rqc3388DXpVB7bkD5n2hrXN2QHG7F75xnhW4TlT923N_ps8N2xWbVRCCCryVp8hxz2wwRrpVZDwW74w75NWW1PtKJ689Dl0yW2fLfrM9bhY6DW5Y3Y949j3bVJW7qw2wf1Yg219W95yGc_8z1NgWW98my764hyTKlW5cpRpm64gdfTW5dQhZC5fFPMtN44h38x68RnjVSnkN990l-81VrWGyR3rHLF2W98zfJQ3Wh0RyW2kx865403KbvW3NtPg725XrYmW6Gl730522rWxN8q1gvgMjSKWVtXg-V95mWLW36xD1 )

Affected Plugin: Quick Restaurant Menu

Plugin Slug: quick-restaurant-menu

Affected Versions: <= 2.0.2

CVE ID: CVE-2023-0554

CVSS Score: 8.1 (High)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

Researcher/s: Marco Wotschka (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWy3pds1V1-WJV7CgN-NW96F_dd8vx1-tW8pMx609j1BCTN50WwQsjxn36W8gjZFr1__gCVW4xQQB84jMm--W3zg2m459PcDFW24Pt-N3NtTkZW55NL851gZVv7MzXgVjLmD6WW7Cv2L87D47MfW1yTMsg1xBx2xW65Wt5h5k-kdXW6vvzR036QgbQMZpRcQJmC1DN7k3pGJHf-N5W1HDJsT3tNR99N57gQfwb0th6N38WNd8h7k_kMHKnVHwPVpgW70vM8c1ZjgWzW9jr7rZ4F119gW72WKJ741CH3HN1hg774YT0MyN8PSn8xtM3MGW8rHJxR18v6BlW1rwQqk4hpfW1W4GzNYh2LdCMLW5FlhM_3pmQxr3kbD1 )

Fully Patched Version: 2.1.0

The Quick Restaurant Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to update menu items, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Vulnerability Analysis

Quick Restaurant Menu is a plugin offered by ThingsForRestaurants that provides site owners with the ability to create menus for different occasions such as lunch and dinner along with the option to price items differently per menu.

As part of the plugin’s functionality, menu items can be created, deleted and moved around on menus. Dividers can be added to menus to visually separate different menu sections from one another. Menu items are stored as posts with type erm_menu_item.

More specifically, the plugin allows users to arrange menu items for menus via a drag-and-drop method and utilizes AJAX actions to accomplish this. Below is one of those functions in more detail:

Code Before Fix (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWS3pdskV1-WJV7CgYchW73X45V2pRqqvW5MdjHN424ThxW1tkJlQ4_bVPtW2__nz284gRfLW88GZB45pTthXW1l030l3ZRkSSW80gdjD2gsGMlW15fMWZ612RgjW1l-dJQ3NN9KmV2-tLj60tGJbW45HHML47nCs8W68tY2d2Kn5t2W3WNH6z7zz6TRVqm5Lh5Lql5wVzpC-z6g3w-pW5c9GT-9j0xqqW2BpPfq2VPH_JW4ZHx8x21ylRXW2XLDkp6nRl9BW9lv8N64RzQdmW76ZFks2hW24ZW3kB59y2YrLKkW2tYZ6d7nt7wtW7rSW9m7yNlWgVzYMtd8LFLyxW1MVxxy7VDCnTW31Z7PG2VWLw4W7vvCBd3TGv6SW6pXXNC3G00f2W5R9Rnb7ZMW1b3lwz1 )

We can see that this short function checks for the existence of a post_id parameter in the POST request, casts this provided parameter to an integer and then deletes the menu item with this id. This function can be invoked by sending a POST request to /wp-admin/admin-ajax.php that contains the action name as well as a post id.

POST /wordpress/wp-admin/admin-ajax.php HTTP/1.1

Host: 127.0.0.1

action=erm_delete_menu_item&post_id=49

A Teaching Moment: Important Safety Measures

We are going to use this function and vulnerability above to discuss several safety measures that need to be taken to secure AJAX actions.

Authorization Checks – Verify the User’s Capabilities

AJAX actions are by default made available to authenticated users. That means the action above can be utilized by subscribers. However, it is not typical for subscribers to alter restaurant menus. It is therefore important that such functionality be protected against misuse by making sure the user performing the action is permitted to do so. One way to accomplish this is a capability check via the current_user_can function, i.e. current_user_can(‘manage_options’).

Other capabilities may be deemed sufficient, but the capability to manage options provides a user with access to general settings of a WordPress site and is often used as a proxy. Another, more appropriate, and narrowed in check would be current_user_can(‘edit_posts’, post_id), which would ensure that the user performing the requested action has the capability to edit the post with the ID provided.

This capability check is missing from this and other AJAX actions.

Cross-Site Request Forgery Protection – Verification of Intent

In addition to ensuring that a user has permission to perform an action, one also needs to ensure they intended to perform the action in the first place. We have previously written (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMV35mNXLV3Zsc37CgXr5W4kXMsZ1nrnR_W4xKgb78HSkWFW5f9D6r2TV1ntW3zjdWf2jq7xJW4cnB5c3R-XpyW3Q4GFW3lMSFjW4jZBww4k2B-GW8vFhS44CwY90W7wWRW33HmF6zW822dsh3pN3tdW6TWGnT1rGxt2VQ_dp37HYMpJVhS5Rm2LR5Y2W82CYzW6W1kxXW7rQ-tY2mWQhBW3P49k36LSnbKW7f8rnM70j2YRN6n_x7sthwX9W5bczrq3Sd0hxW65_gxj95zkhRW6FBCdB3lx-rPW3bcx573FfrlqW17t84G1ZfCgvW2g_R5_3NdLyLW7ck0yb3C2MYgN3123TkV9lzYW3TDwc_3_-0spW6FdL_G5dmtt6W6PKSK32X6xk3W3r73d27wrB74W3vNZkl2NC0fyW8Mf6Hm3WJ3hzW227P2h7k33sdN3zf0gkz7__V3gT11 ) about the importance of properly implementing nonce checks to prevent Cross-Site Request Forgery vulnerabilities. As a general rule, the nonce is set when an action such as dragging, adding or deleting a menu item is initiated in the administrator dashboard or the plugin’s corresponding page. The AJAX action processing the request needs to verify that the nonce provided to it is correct, thus verifying that the request was initiated with intent.

Nonces can be added to a URL directly via the wp_nonce_url() function or via wp_create_nonce(). For verification of the nonce, WordPress offers several options. One of them is the function check_admin_referer() which accepts the name of the protected action as well as the name of the nonce intended to protect it. It checks the nonce as well as the referrer ensuring that the request came from an admin page. The second option – check_ajax_referer() – verifies the nonce and validates that the request is an AJAX request. A general-purpose function provided to developers is wp_verify_nonce(), which expects a nonce as an argument and ensures it is properly set.

This protection against Cross-Site Request Forgery attacks is missing from this and other AJAX actions in the plugin.

Insecure Direct Object Reference – Verification of the Object Acted Upon

The plugin stores menu items as posts with type erm_menu_item. In the AJAX action above, it invokes the wp_delete_post() function to permanently delete its menu items. However, it does not check to ensure that the deleted item is of type erm_menu_item. In addition, the force_delete flag is set ensuring that items are deleted immediately.

A proper way to ensure deletion does not impact items the user should not act upon is via the use of a type check. WordPress provides the get_post_type() function for this purpose to retrieve the post type that can be used to verify that the post is the right type that should be modified. This could be used in conjunction with the aforementioned current_user_can(‘edit_posts’, post_id) capability check which verifies that the user initiating the action is allowed to modify the resource, which in this case would be the supplied post ID.

Putting it All Together

The plugin’s AJAX actions were affected by several vulnerabilities that when combined could result in substantial damage to a site with a vulnerable version of the Quick Restaurant Menu plugin installed. On its own, the Missing Authorization vulnerability enables subscribers to delete menu items, but when combined with the Insecure Direct Object Reference, the vulnerabilities allow for the deletion of any page and/or post.

The Patch

The plugin developers implemented the following fixes:

Fixed Code (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWS3pdskV1-WJV7CgYchW73X45V2pRqqvW5MdjHN424ThxW1tkJlQ4_bVPtW2__nz284gRfLW88GZB45pTthXW1l030l3ZRkSSW80gdjD2gsGMlW15fMWZ612RgjW1l-dJQ3NN9KmV2-tLj60tGJbW45HHML47nCs8W68tY2d2Kn5t2W3WNH6z7zz6TRVqm5Lh5Lql5wVzpC-z6g3w-pW5c9GT-9j0xqqW2BpPfq2VPH_JW4ZHx8x21ylRXW2XLDkp6nRl9BW9lv8N64RzQdmW76ZFks2hW24ZW3kB59y2YrLKkW2tYZ6d7nt7wtW7rSW9m7yNlWgVzYMtd8LFLyxW1MVxxy7VDCnTW31Z7PG2VWLw4W7vvCBd3TGv6SW6pXXNC3G00f2W5R9Rnb7ZMW1b3lwz1 )

By implementing the nonce check

if (!wp_verify_nonce(sanitize_text_field($_REQUEST['nonce']), 'erm_menu_actions' )),

the function now ensures that a proper nonce is set which properly verifies intent and prevents Cross-Site Request Forgery attacks from being successful. The function also performs a post type check before performing deletion, which fixes the Insecure Direct Object Reference vulnerability that made it possible to delete arbitrary pages and posts. Now a user can only delete posts with the erm_menu_item type.

One thing to note is that a proper authorization check is still missing. The function does not ensure that the person performing the action has the proper capabilities. However, those are implied through the use of a nonce check. As long as the nonce is properly verified and an erm_menu_actions nonce cannot be obtained by users other than those intended to perform those actions, it concludes that only properly authorized users should have access to this function. This is the case in this plugin which makes exploiting the missing authorization impractical. Despite that, we still highly recommend developers ensure capability checks are used as the primary method of authorization control since a nonce could have the potential to be exposed at some point later in development, or by a separate vulnerability.

Disclosure Timeline

January 16, 2023 – Initial outreach to the plugins team. The Wordfence team releases a firewall rule to protect against the Missing Authorization vulnerability. Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgDzJW82X0Cg5G8FqqW6T02KS1ywJRwN5YVM22ZpGK-W7JMSq32Br-09W1G-x2K1PnfP5W4Tb3ZQ3yKTLpW7X9Hqs4HXdmhW2LLXC83qbXbpW1JVw-D4rc2s6W5GrXTt42zL1ZW7D0BmC4bCBG6N720tgG4xb8FN3pZ5Ygh1Mt3W8mMpHy8Syx2GW4jDkYH7K9CWzW7QL7Lr67TLqdW1_0bJR2Hn-bgW5l26KN1v74lsW8RF1Jh6zL854W4qn_RJ3SJmZMW2lGlTr7Sg-YBW7jtCtg42vprqW4DjS0K4cRVZmW60MXf22FQ5zD32MM1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgzY5W8SkHwB95t3HQW3HFsvZ8c2KL7W4tp-H14cJJgTW8cY5zV8wQr4BVSY9tf5HQcQkW2JKQpv5tgCprW4-dq9Y8xc-mNW4gTBhS4FqF2sVvnYvH6ykW1-N1T4hl46vb0GW5_zbJH450XyjW5jQBqY7bbH1cW2nTTSF1pN04hN372nddW_YhVW49LKt31SB-mdW18STf76zC-kzW2r-Ss12__wKVW80kHPp4WKgdJN4f8q1LwQ8z3N5q4yWkGSRkZW4J_ysN5TGfvQW8B3PkL5hHBD-W7pYbQK2ySJCNW5LxWL_4xTL7j37yq1 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgYY9N41PdCwymsv3N5k_vSZY1CwQMlY77DLFDxKW1g1VmQ7D6fhKW4wxXcC4jxWPjW6LVTcZ1D8wPrW8-k-pp40s_YcN4JJp033J4fKW7Ck6MG95l9xsW7bqBl22wD0tBW5YcWbS4lz0SPW362TsK76TBS2W1G-0sM5MF38fN3f4_j4YtlCFW3s_fzq4fh9hQV_YwlJ4njNPcW5qswxp3bBSpwW2qhfSK7KChqSVgFdw_3wqQcFW2MVkGr4YPgq3N93zNKBPtkt0W26YTqz7gsJ9BW65SqS07HDTDzW1c8nkY5-3YT_3bj31 ) users receive this protection.

January 18, 2023 – The team acknowledges receipt of our findings

January 20, 2023 – Version 2.1.0 is released which provides a patch for the reported vulnerabilities. The plugin is still closed for downloads, however.

February 15, 2023 – Wordfence free users receive the same protection.

Conclusion

In today’s post, we covered several vulnerabilities in the Quick Restaurant Menu plugin that could be used by subscribers to delete arbitrary posts and pages due to improper authorization checks.

Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgDzJW82X0Cg5G8FqqW6T02KS1ywJRwN5YVM22ZpGK-W7JMSq32Br-09W1G-x2K1PnfP5W4Tb3ZQ3yKTLpW7X9Hqs4HXdmhW2LLXC83qbXbpW1JVw-D4rc2s6W5GrXTt42zL1ZW7D0BmC4bCBG6N720tgG4xb8FN3pZ5Ygh1Mt3W8mMpHy8Syx2GW4jDkYH7K9CWzW7QL7Lr67TLqdW1_0bJR2Hn-bgW5l26KN1v74lsW8RF1Jh6zL854W4qn_RJ3SJmZMW2lGlTr7Sg-YBW7jtCtg42vprqW4DjS0K4cRVZmW60MXf22FQ5zD32MM1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgzY5W8SkHwB95t3HQW3HFsvZ8c2KL7W4tp-H14cJJgTW8cY5zV8wQr4BVSY9tf5HQcQkW2JKQpv5tgCprW4-dq9Y8xc-mNW4gTBhS4FqF2sVvnYvH6ykW1-N1T4hl46vb0GW5_zbJH450XyjW5jQBqY7bbH1cW2nTTSF1pN04hN372nddW_YhVW49LKt31SB-mdW18STf76zC-kzW2r-Ss12__wKVW80kHPp4WKgdJN4f8q1LwQ8z3N5q4yWkGSRkZW4J_ysN5TGfvQW8B3PkL5hHBD-W7pYbQK2ySJCNW5LxWL_4xTL7j37yq1 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgYY9N41PdCwymsv3N5k_vSZY1CwQMlY77DLFDxKW1g1VmQ7D6fhKW4wxXcC4jxWPjW6LVTcZ1D8wPrW8-k-pp40s_YcN4JJp033J4fKW7Ck6MG95l9xsW7bqBl22wD0tBW5YcWbS4lz0SPW362TsK76TBS2W1G-0sM5MF38fN3f4_j4YtlCFW3s_fzq4fh9hQV_YwlJ4njNPcW5qswxp3bBSpwW2qhfSK7KChqSVgFdw_3wqQcFW2MVkGr4YPgq3N93zNKBPtkt0W26YTqz7gsJ9BW65SqS07HDTDzW1c8nkY5-3YT_3bj31 ) users received a firewall rule on January 16, 2023 for enhanced protection. Wordfence free users will receive this rule after 30 days on February 15, 2023. Regardless, we highly recommend manually downloading the patched version, or uninstalling the plugin completely until the plugin has been reinstated.

If you believe your site has been compromised as a result of this vulnerability or any other vulnerability, we offer Incident Response services via Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgzY5W8SkHwB95t3HQW3HFsvZ8c2KL7W4tp-H14cJJgTW8cY5zV8wQr4BVSY9tf5HQcQkW2JKQpv5tgCprW4-dq9Y8xc-mNW4gTBhS4FqF2sVvnYvH6ykW1-N1T4hl46vb0GW5_zbJH450XyjW5jQBqY7bbH1cW2nTTSF1pN04hN372nddW_YhVW49LKt31SB-mdW18STf76zC-kzW2r-Ss12__wKVW80kHPp4WKgdJN4f8q1LwQ8z3N5q4yWkGSRkZW4J_ysN5TGfvQW8B3PkL5hHBD-W7pYbQK2ySJCNW5LxWL_4xTL7j37yq1 ) . If you need your site cleaned immediately, Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgYY9N41PdCwymsv3N5k_vSZY1CwQMlY77DLFDxKW1g1VmQ7D6fhKW4wxXcC4jxWPjW6LVTcZ1D8wPrW8-k-pp40s_YcN4JJp033J4fKW7Ck6MG95l9xsW7bqBl22wD0tBW5YcWbS4lz0SPW362TsK76TBS2W1G-0sM5MF38fN3f4_j4YtlCFW3s_fzq4fh9hQV_YwlJ4njNPcW5qswxp3bBSpwW2qhfSK7KChqSVgFdw_3wqQcFW2MVkGr4YPgq3N93zNKBPtkt0W26YTqz7gsJ9BW65SqS07HDTDzW1c8nkY5-3YT_3bj31 ) offers the same service with 24/7/365 availability and a 1-hour response time. Both of these products include hands-on support in case you need further assistance. If you have any friends or colleagues who are using this plugin, please share this announcement with them and encourage them to update to the latest patched version of Quick Restaurant Menu as soon as possible.

If you are a security researcher, you can responsibly disclose your finds to us and obtain a CVE ID (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVG3pdr7V1-WJV7CgCZQW5qHq_W1QZNYLVCLsSL94F3dJN1BXPL6b3kT2W1wlcxR88Sc8_V2q1Qg9blQsCVFXKj54wWBLvW2LjdVZ1mHWTzW2kLQbV6mf-rmW1Fb0Xn4fVmfCW26QC1m54L6v-W48wG0V4S6-vqW5pgCNl80XQkfW84Qr-64KZBSBW8D4Vwh1Xyyc2W91d7Z-4BSCWsW3J0kXq6LPX9KW3TLjv996FxrpW71lt2N2YdfV2W5wsmwJ3ftz0CVjTqPV1258WmW1Q1Q7S3Q3w_9W2gh0x29cJgzP2gt1 ) and get your name on the Wordfence Intelligence Community Edition leaderboard (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMWf3pdrLV1-WJV7CgXyBW23QMXT5R-4tMVyZz053lVQ4VW8NHb6q2P9WBjW5yqWLJ4L4Sf5W6wHkV-3D87cZW6rsD6g8TF__CW96tcf32ZwR59W57_-0t3VygrJW4VnPx345l2wvW4KLgD21bSqqmW5kdbw747dd8qW1jmCtQ5zmYK1W8J1LWd1CL4b6W8bHGPM77MmjyN4x6LVvSnZnbVWjbJB75jgcdW80PPj_4zwlx6Vbh4ps6SFVxJW57hS0b2xZfCcW518t2m2X7FNSW6bydlG5wMSmhVTZYMD8rjDMWW3ZKqQ84jKck1W7Bp1K76fpffMW3561M65gtZKjW4_zZLT6T7Hk137fq1 ) .

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVG3pdr7V1-WJV7CgJ_8W6T1mj859DfFpW41DJvd7ttblvW5fT-ZS2-0R-NW71GMCR1XSlF9W7f-PQt7ZCr2pW6wVQxS2Cs6kWV_D3lz5RYx-cW7Q1Nc03prvvGW8Snd_c3c_qLNW5wB0Z316G7YLW6BB09J1N1FdVW1kGCsr7_-G6qW65yjGq7P0wX5N3050Wt3ZdrSW54YD9M2KpJSQW3dCH1_3nHM6pW5VWhGk4LwVbkW7PVj8f54W7wWW5GLDgy7lJPhhW2Bbc_d8-QwDBW1L4f8M4lQqnyN3K6rJZMPRFW3mSS1 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgLBLW2-psc35G5CY0W8h76xJ97pKrGV4vhQB3PlS3dW8WKXlx6F1fqLVJ0vXk3m023bVPpGnY4sTfpdW4XLH509hlsbQN8bDWM6GTpKQW3n5kFN8pXFxPW2dwdMh1w-Lb-W16txrQ7KhHwKV778JL7ylrvfW1YfRL1985Tj3W5Y8Jnr1nB5yqW6fkqM23Dd8dgN5fnWNSVHg0qW1Vz4pb74sMlpW5cjsP3272db_W7vQXQ22JxRMpW900LxS8KMn87W7FrtZc763ystW3b9Lb81xKBxfW4hzkyz6M6Wv7W5QnkmV2mTYj93fPw1 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVG3pdr7V1-WJV7CgBm8Vz8QxF95j_WWW5jxz6d1z3Jb8W2H9HL34NB8t9N5HX7cv8x_49W19xlf-4G_F2xW3TCwvT4c4LsbW7R9dvm6S0gVGW4tcbBx7-2sGMW36YCVm3K-wdHW3PhfNP5nf_H_W7Lxy1f5gPTTzW8B2F3S83sWhvW4wRVHP57HtPqW2pHBmD3G4SXnW2kSXnH70m6tYN1xDHq8z5GK3W5hJ2vx2RycbHW1QnZwQ8y2H5gW3PGVXp770JNCW5SFG2v3jVpLLW8DQ0YZ5fhDZKW2GKtmV6Dw3YR3cSH1 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7CgQkbW6Ydcd94JJ5pKW33cWVV2wFTT9W3vq8Kv4R29-1W4JmHcB3Zjh0mW5fY78m8Ygd9lN4hgQ3RNzvXLW6xk9zK1L-9xRW7pXqh842HHfBW83jw_K2F-H63W4tpLdz5WbscxW6PVbHQ2nlspdW3nb3XZ6fvsd7W7QDLHw8VP9ZWW4DTTNV7HJ0DTN3L22L8KxvjxW4NhnJb9dDNptW3zbHrN4zYBH5W2BZ5pG8vd3z4N7JX8DlP1mGgW6kjVq443MdkgW6X1wjX9j9wxnW2kCPcy8hzmTQW1QS2T01fq4VXW8rD9_175NXZJ3fHb1 )

wf-stacked-intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVZ3pdrrV1-WJV7Cg-qtW554sHp6DcKQbW7_d5V77nWfx7W5VSRnB8HT527W5tTyN71M9LP0W4Nmt4G4MwH9zW4-zCjX5pk0shW90Cmgl1FRnxKW7DTchb5LLl4LW5KHP1n6PqDM4W89B5nz706mPBW8fHzLj23h9qPW29MYJj27f0YQW89sn4s3k022NW2xKjZx2TsJ1wW7jzg3140BXRYW6Xv14x1ygK6TW68R3lD2y4hMKW4YbJsp4wrXSMN37mTm5QSByRW1CxrJs6j3hwlW6pxVx31c1YFWW39Ry6c2YWVcSN6GB7HqYkLKXN2zz7JBqqfrv33Fh1 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWR6Qx4HtNQzW8gXTxq8w57SBW5QKV2t4Ww445N69sMVm3pdqSV1-WJV7CgMg8N9k1P7MG-1qRN8pn7CpQbN89Vy5dZ48lvZmwN2TbdRDnxhR5Vp5Rws2Kw9VlVjNkZj1R6hqfW4VKy2G16Zy8GVbvRFp8K9RnHW1BYvSD6fvH2gW75fYsS8ZC5PXVw_gYX3cHvpNVYM42v5pKrv5W7lsMV34T_wqDW5WytRy5_WhGyW1kZ7_-9lxZP_W6JcxBV847mpYW3BvllR6h_nT2W3k8LcC942cj5W7b5qh-2S5NqzW8Qjcm01LF9gR3mCg1 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFdBW4QXnf-85MdZ0V25z_w4VPkZ9N6cgTHXWGR_ZN8QgrmnXk_7QVbw0qm2MxJWwW2hT38c4YDSsSw8Syf-7m8X2&v=3&_hsenc=p2ANqtz-_QZ6frujgCg2OG-zDburdGcNO-IpN1fckbWW_Yg-Ga9kYmn58wPWNeFvkh5kNiH3uZzN-PypBsgkCtWESB0QIhOYhj9g&_hsmi=244178479 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFdBW4QXnf-85MdZ0V25z_w4VPkZ9N6cgTHXWGR_ZN8QgrmnXk_7QVbw0qm2MxJWwW2hT38c4YDSsSw8Syf-7m8X2&v=3&_hsenc=p2ANqtz-_QZ6frujgCg2OG-zDburdGcNO-IpN1fckbWW_Yg-Ga9kYmn58wPWNeFvkh5kNiH3uZzN-PypBsgkCtWESB0QIhOYhj9g&_hsmi=244178479 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Wed Feb 01 2023 - 19:13:39 CET

This archive was generated by hypermail 2.3.0 : Wed Feb 01 2023 - 19:22:49 CET