The flaw was found by Jouko Pynnönen, and is a cross-site scripting (XSS) bug similar to one patched last week. It is buried within the widely used web publishing software's comments system.
The vulnerability is present in WordPress version 4.2 and below. Pynnönen revealed the flaw on his blog on Sunday before the WordPress team could release a patch for the software: the researcher feared WordPress would take too long to fix the hole, and wanted to warn everyone beforehand.
"I didn't report the bug to the vendor this time," Pynnönen told The Register in an email earlier today.
The security blunder is exploited by posting a 64KB comment to a WordPress blog page. This data is truncated as it is written to the database, breaking safety checks that are supposed to filter out malicious code when the comment is displayed to visitors.
In a statement on their website, Premera said that issues related to their network have been resolved, and the company is working to strengthen security measures. The initial attack occurred on May 4, 2014, but the intrusion was not discovered until January 29, according to Premera.
The attack potentially affects 11 million customers. About 6 million of those live in Washington state, where some customers are employees at companies like Amazon and Microsoft, Reuters reported. More...
- Comments considered harmful: WordPress web hijack bug revealed
- How to Defeat a Smarter Breed of Cyber Threat
- Premera cyberattack could have exposed information for 11 million customers
- Online Bank Robbers Steal as Much as $1 Billion, Says Kaspersky
- Cellphone 'kill switch' leads to sharp declines in theft
- Your TV may be watching you
- White House renews effort on cybersecurity bill with new proposal
- Sony malware may be linked to other damaging attacks: researchers
- 'Sony-pocalypse': Why the Sony hack is one of the worst hacks ever
- Hackers Probing Financial System’s Defenses Show Why Everyone Should Worry