Showing posts with label cmd. Show all posts
Showing posts with label cmd. Show all posts
Severity Rating: High
Software Affected:            
·         Word press plug in before 2.54.6
Overview:
Multiple vulnerabilities have been reported in Word Press Plugin which
could allow an attacker to execute remote code execution on the targeted
system.
Description
1.                     Cross-Site Scripting Vulnerability (CVE-2020-12675)
This Vulnerability exists in Word Press page builder plug in due to
improper handling the Checks for AJAX Functions. An authenticated remote
attacker could exploit this vulnerability by passing the user request
through AJAX Function Checks with subscriber level or wp-admin in an
authenticated session on the targeted system. Successful exploitation of
this vulnerability may result in remote command execution to download or
delete arbitrary PHP files or upload arbitrary malicious PHP files to
vulnerable sites.
2.            Cross-Site Request Forgery Vulnerability
This Vulnerability exists in Word Press page builder plug in due to
improper handling the user requests for updating site's setting. A remote
attacker could exploit this vulnerability to forge a request on behalf of a
site's administrator to modify the settings of the plug in. Successful
exploitation of this vulnerability may result in remote command execution
to allow the malicious Java script injection to vulnerable sites.
Solution

Apply appropriate patches as mentioned in Word Press Bulletin:

elayer-plugin-affect-over-200000-wordpress-sites/

References:
Vendor Information

Word Fence

elayer-plugin-affect-over-200000-wordpress-sites/

Alert Logic

- -vulnerability-cve-2020-12675-in-mappress-plugin-for-wordpress/

CVE Name
CVE-2020-12675

© Copyright 2020. Designed By Templateify

© Copyright 2020. Ud64

Scroll to Top