Over 50,000 websites have been compromised within the first three weeks following the disclosure of a critical vulnerability in the MailPoet plugin (formerly known as Wysija Newsletter) for WordPress.
The vulnerability allows the attacker to upload any content including PHP script files to the server without authentication. Successful exploitation of the vulnerability allows the attacker to execute code on the WordPress system and take complete control of the website.
The popularity of the plugin (over 1.7 million downloads) has attracted the attention of Malware authors who have already seized the opportunity to create a worm designed to propagate via vulnerable WordPress systems .
The initial patch for the vulnerability failed to correctly fix the problem, therefore we recommend that users of the software apply the 2.6.9 update, even if patches were applied following the initial disclosure.
Scanning WordPress with AppCheck NG
The AppCheck NG system has a dedicated WordPress module designed to identify vulnerable plugins and configuration weaknesses.
Sign up now for a free trial to scan your web sites and application; Register HERE
Download Appcheck NG Brochure; Brochure Download
Download Appcheck NG Sample Report; Example Appcheck NG Webscan
An exploit for the vulnerability has been published for the Metasploit Framework; Exploit Link
 Malware Infection; link
 Original Advisory; link
Appcheck NG Scan Sign-up
Apache Struts 2 is an open-source web application framework for developing Java EE web applications. It uses and extends the Java Servlet API to encourage developers to adopt a model–view–controller (MVC) architecture.
On April 24th the Apache Struts project released an advisory for a remote code execution vulnerability affecting all versions of Struts between 2.0.0 and 22.214.171.124. Struts 126.96.36.199 (the latest release) is not vulnerable.
What does the flaw allow the attacker to achieve?
The vulnerability allows the attacker to gain remote code execution on the affected server, effectively providing the attacker with an interactive command shell which can be used to pivot onto corporate networks from externally facing webservers.
UPDATE (11/04/2014): Proof of Concept exploit module added to Appcheck NG: Screenshot
On 7th April 2014 a group of security researchers disclosed a critical security flaw in the popular cryptographic software library OpenSSL.
The Heartbleed Bug allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.
OpenSSL is the most popular open source library for providing encrypted SSL communications on the Internet and therefore there is a high chance that this flaw will affect your network and applications.
The Sec-1 AppCheck NG Web Application and Infrastructure vulnerability scanner has already been updated with a plugin to detect the flaw.
A high-profile news article published last week brought the risk of insider threats from current or disgruntled employees to reality. A high profile retailer suffered the loss of thousands of employee data records at the hands of an employee who has since been arrested.
This real life example and the exposure of this attack has propelled this type of threat to the forefront with a recent study by Sec-1 partner, Imperva, identifying that 70% of employees admit to accessing data which they shouldn’t.