Jetpack SSO Security Risk using WordPress.com login
-
During new install/set of Jetpack, it ask for a wordpress account to register. Jetpack auto-populated the username, I took a guess using an old password, and it successfully authenticated my account….using a 9 character, all lowercase, extremely weak password (keep reading, it gets better).
Upon my next login to my domain.com/wp-admin, I see a new option to use WordPress account to login. Clever…or maybe not?
Well, later I get an email notification from Wordfence that someone logged into my account, as me, from a different country!!!
Immediately logged in and blocked their IP, killed the sessions, reset accounts/password, etc.
How could someone from another country gain access as me to my website?
Then it hit me, that awesome SSO Jetpack feature that comes enabled by default!
Rewind for a moment, months back, Im logging into mydomain.com/wp-admin and I get a notification about my password being identified on a compromised password database, and I was forced to change it.
Forward to today, it now appears they used the compromised wordpress.com account, identified as compromised by www.remarpro.com, to login to mywebsite.com/wp-admin.
So wordpress identifies account is compromised and alerts you to take action, only to give backdoor access using the official WordPress Jetpack plugin?!?!?!
Seems like wordpress.com should cross-reference the same compromised password database, as the one www.remarpro.com uses when logging into domain.com/wp-admin. And, not force SSO as an enabled default without ensuring some kind of password strength, as they do for any other account that gains access to the website/blog.
Cannot make this stuff up.
- The topic ‘Jetpack SSO Security Risk using WordPress.com login’ is closed to new replies.