|
|||
Rule General Information |
---|
Release Date: | 2020-09-04 | |
Rule Name: | Wordpress File Manager Unauthorized File Upload Vulnerability | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | File Manager, a WordPress plugin.Attackers are using the exploit to upload files that contain webshells that are hidden in an image. From there, they have a convenient interface that allows them to run commands in plugins/wp-file-manager/lib/files/, the directory where the File Manager plugin resides. | |
Impact: | In the affected version, attackers can use this vulnerability to upload files and then execute arbitrary code. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://arstechnica.com/information-technology/2020/09/hackers-are-exploiting-a-critical-flaw-affecting-350000-wordpress-sites/ https://www.solidot.org/story?sid=65420 |
|
Solutions |
---|
Check the Wordpress File Manager plug-in to make sure the version number is 6.9 and above. |