Goby/json/Wordpress-Duplicator-1.3.26...

60 lines
3.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Wordpress Duplicator 1.3.26 Arbitrary File Read (CVE-2020-11738)",
"Description": "<p>Duplicator is a powerful migrator plugin for Wordpress.</p><p>The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.</p>",
"Product": "Duplicator",
"Homepage": "https://wordpress.org/plugins/duplicator/",
"DisclosureDate": "2021-10-06",
"Author": "1291904552@qq.com",
"FofaQuery": "app=\"WordPress\" && body=\"Duplicator\"",
"GobyQuery": "app=\"WordPress\" && body=\"Duplicator\"",
"Level": "2",
"Impact": "<p>The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.</p>",
"Recommandation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://wordpress.org/plugins/duplicator\">https://wordpress.org/plugins/duplicator</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2. Upgrade the Apache system version.</p>",
"Translation": {
"CN": {
"Name": "Wordpress 插件 Duplicator 任意文件读取漏洞CVE-2020-11738",
"VulType": ["文件读取"],
"Tags": ["文件读取"],
"Description": "<p>Duplicator是Wordpress的一个强大的迁移器插件。</p><p>WordPress 1.3.28 之前的 Snap Creek Duplicator 插件(以及 3.8.7.1 之前的 Duplicator Pro允许通过文件参数中的 ../ 对 duplicator_download 或 duplicator_init 进行目录遍历,攻击者可获取配置等敏感信息。</p>",
"Impact": "<p>WordPress 1.3.28 之前的 Snap Creek Duplicator 插件(以及 3.8.7.1 之前的 Duplicator Pro允许通过文件参数中的 ../ 对 duplicator_download 或 duplicator_init 进行目录遍历,攻击者可获取配置等敏感信息。</p>",
"Product": "Duplicator",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新: <a href=\"https://wordpress.org/plugins/duplicator\">https://wordpress.org/plugins/duplicator</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、升级Apache系统版本。</p>"
},
"EN": {
"Name": "Wordpress Duplicator 1.3.26 Arbitrary File Read(CVE-2020-11738)",
"VulType": ["fileread"],
"Tags": ["fileread"],
"Description": "<p>Duplicator is a powerful migrator plugin for Wordpress.</p><p>The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.</p>",
"Impact": "<p>The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.</p>",
"Product": "Duplicator",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://wordpress.org/plugins/duplicator\">https://wordpress.org/plugins/duplicator</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.Upgrade the Apache system version.</p>"
}
},
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-11738"
],
"HasExp": true,
"ExpParams": [
{
"name": "filepath",
"type": "input",
"value": "../../../../../../../../../etc/passwd"
}
],
"ExpTips": null,
"ScanSteps": null,
"ExploitSteps": null,
"Tags": [
"fileread"
],
"VulType": ["fileread"],
"CVEIDs": ["CVE-2020-11738"],
"CVSSScore": "7.5",
"AttackSurfaces": {
"Application": ["Duplicator"],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}