WordPress – wp-admin exposed

Description

During the scan, Kayran managed to find the WordPress – wp-admin exposed vulnerability.
The admin login page (example.com/wp-admin/) is accessible from any IP address.

An attacker could exploit this finding to perform Brute Force attacks against users or to create a similar phishing page in order to get admin\user login credentials, since, basically, anyone is able to access the login page.

Hackers and bots (being used by attackers), are trying to attack a WordPress site’s login page often look for it in it’s default location. Instead of hosting the login page on /wp-login.php, install it in a directory folder with a random name, only known to trusted people.

Recommendation

Restrict access to the login page (/wp-admin/) section to any unauthorized IP addresses.

You can set that kind of configuration easily in your .htaccess, there is a sample code you can start with :
AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName “WordPress Admin Access Control”
AuthType Basic
<LIMIT GET>
order deny,allow
deny from all

whitelisted IP addresses

allow from xx.xx.xx.xxx
allow from xx.xx.xx.xxx
</LIMIT>

References

https://wordpress.org/support/

< Return to all Vulnerabilities

Red Team

You’ve probably heard that there are teams in the Cyber field called Red Team and Blue Team. Let’s talk about the red one, shall we?

Read More »

Servers 101

Let’s have a “quick” Servers 101 Course. Courtesy of Kayran! If you’ve been on the internet for over an hour, you probably already heard of

Read More »

HTTP VS. HTTPS

You must have once wondered what HTTP means and what is the difference between that ugly word to HTTPS, and if not, then please read

Read More »

HAR Files

In this article, I’ll talk and explain about HAR Files, so if you don’t know what they are, or, what do we use them for,

Read More »