WordPress is the backend for many websites around the world. One WordPress plugin installed on over 1,000,000 websites has been found to have two separate vulnerabilities. A plugin called WordPress Download Manager is used to change the way download pages are displayed. The vulnerability has been discovered by the Ward Fence Threat Intelligence team and involves an attacker who achieves authenticated directory traversal. Currently, WordPress Download Manager has some protections to protect against directory traversal, but it has not proven to be sufficient in this particular case.
Prior to this, the WordPress Download Manager team patched a vulnerability that allowed users to upload files with a php4 extension and other potentially malicious files. This patch protected many configurations, but was the last to allow an attacker to perform a “double extension” attack by uploading a file with multiple extensions, such as info.php.png. I checked only the file extension of.
The Wordfence threat intelligence team disclosed the findings to the WordPress team in May, and the developers released a patch the next day. Website owners who use WordPress are advised to update to the latest version immediately.
Read all the latest news, latest news, coronavirus news here
Attn website owner! WordPress has been found to have these vulnerabilities: Here’s how to fix them:
Source link Attn website owner! WordPress has been found to have these vulnerabilities: Here’s how to fix them: