• I’m running this hosting control panel:

    Plesk Obsidian
    Version 18.0.44 Update #3, last updated on June 22, 2022 12:15 PM

    Plesk has a WordPress Toolkit feature built into it. For several weeks it has been listing this message:

    WordPress iQ Block Country plugin <= 1.2.13 – Protection Bypass due to IP Spoofing vulnerability

    I’ve read recent threads, understand the “volunteer” nature of the development, and that it took some time for the updated plugin for release – which obviously HAS happened now.

    However, I find that the WP Toolkit is still flagging the plugin, despite being updated to this new 1.2.17 version, as vulnerable. Does anyone know if we are now in some status where those that manage WP Toolkit needs to test the 1.2.17 version and certify it as stable?

Viewing 15 replies - 1 through 15 (of 19 total)
  • iThemes Security is also flagging it:
    https://itsec-site-scanner.ithemes.com/vulnerability-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%253D%253D

    Says:

    Vulnerabilities
    iQ Block Country <= 1.2.17 – Protection Bypass due to IP Spoofing

    Thread Starter gbdg

    (@gbdg)

    @bkjproductions I’m hesitant to click on your tinyurl. Might you be willing to tell us what’s there please?

    @gbdg It’s a link to the iThemes Security notice, which says:
    Vulnerabilities
    iQ Block Country <= 1.2.17 – Protection Bypass due to IP Spoofing

    Plugin Author Pascal

    (@iqpascal)

    The plugin is not a full proof security toolkit. If someone wants to get to your website they can with any security solution.

    If someone has the knowledge to spoof IP’s and wants to attack your website they will find a way no matter which solution you use.

    For 99.99% of the websites the plugin will just work fine and that is to block normal users and automated bots from your website. If somebody wants to take the time and effort it takes to spoof IP’s you’re in a different kind of league.

    Plugin Author Pascal

    (@iqpascal)

    There is btw quite an easy solution for most who do not use a proxy or anything else as the ‘vulnerability’ exists because the plugin has to check for an IP address in various other headers that are set by for instance CloudFlare or other proxying/CDN software.

    If on your tool tab at the end of the page there is an IP address at “REMOTE_ADDR” you can set on the home tab the “Override IP Info” to REMOTE_ADDR

    REMOTE_ADDR can still be vulnerable to IP spoofing but is less easy than using the regular header IP spoofing. But again in my opinion if someone wants to use a method like IP Spoofing to access your website you’re in a different kind of league of websites than a small business, personal blog or other regular site.

    Moderator Steven Stern (sterndata)

    (@sterndata)

    Volunteer Forum Moderator

    @bkjproductions Moderator note:

    Please don’t use URL shorteners. They been abusued in the past, so our policy is to expand them when we find them, as I have done above.

    Thread Starter gbdg

    (@gbdg)

    @iqpascal

    Thanks for your replies today. I was hoping to share a screen capture of what I see in Plesk, but there is no option to upload an image here. Briefly, the message reports this:

    WordPress iQ Block Country plugin <= 1.2.13 – Protection Bypass due to IP Spoofing vulnerability. Not fixed yet

    When one clicks on the “details” link, you are sent to this URL:

    https://patchstack.com/database/vulnerability/iq-block-country/wordpress-iq-block-country-plugin-1-2-13-protection-bypass-due-to-ip-spoofing-vulnerability

    Do you folks have any plans of coordinating with patchstack.com to get this listing resolved?

    Thread Starter gbdg

    (@gbdg)

    I’m finding that this plugin is being updated again today.

    1.2.17 → 1.2.18

    Still hoping to get a response to the question I asked above.

    Do you folks have any plans of coordinating with patchstack.com to get this listing resolved?

    Thread Starter gbdg

    (@gbdg)

    It’s now Sept 1st. I’m still getting this message.

    WordPress iQ Block Country plugin <= 1.2.18 – Protection Bypass due to IP Spoofing vulnerability

    Is there any sense of when someone might coordinate with these folks to convey that the problem has in fact been resolved?

    https://patchstack.com/database/vulnerability/iq-block-country/wordpress-iq-block-country-plugin-1-2-13-protection-bypass-due-to-ip-spoofing-vulnerability?_a_id=110

    Plugin Author Pascal

    (@iqpascal)

    @iqpascal Can you get the Patchstack people to remove your plugin from the “danger” list?

    I am just trying to eliminate the security vulnerabilities listed in WordPress toolkit for all my site, and this is the only plugin left that generates a message about it through patch stack. Based on your information by setting override to remote address, we can protect against such vulnerability to some degree. However this does not eliminate the security vulnerability message of which I believe you have limited or no control over that we receive from tools like WordPress toolkit that get there info from patch stack.SO I assume there is nothing that can be done further then what you mentioned earlier.

    Plugin Author Pascal

    (@iqpascal)

    Plugin Author Pascal

    (@iqpascal)

    The only real solution for the ‘vulnerability’ is to disregard all headers set by for instance Cloudflare, reverse proxies and other (proxy) solutions for the checks we do. But as people actually do use such solutions that would render the plugin useless for them.

    If your content should never-ever (for as far as that is ever possible) be accessed by those countries you block you should set the override option. But no solution is fool proof as even multi million dollar companies who build their own solutions to GEO protect their content cannot make it 100% secure.

    Hi Pascal, I have tried to contact “Daniel Ruf” who appears to be the person that raised this “Vulnerability” against your plugin. I asked him to re-categorise the CVE he raised (or indeed close it) as it would be more accurately defined as a “Deficiency” rather than a “Vulnerability”.
    My argument would be that a “vulnerability” is a bug in code that allows hackers to bypass inherent security in the core code (for example code that would allow hackers to modify the core code or override its functionality). That cannot be true of your code – if you uninstall the plugin then WordPress will be less secure.
    I did suggest he explain on the CVE why we should uninstall your plugin if he does not agree that WordPress is stronger with it than without it, we shall see what he does (my guess would be nothing) but I just wanted to let you know that you have users out here who really appreciate the security your plugin does provide. Keep up the good work mate. Dik.

Viewing 15 replies - 1 through 15 (of 19 total)
  • The topic ‘1.2.17 version listed by Plesk WP Toolkit as vulnerable’ is closed to new replies.