Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m879-f7xg-j86f

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services

Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services

EPSS

Процентиль: 41%
0.0019
Низкий

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 5.3
nvd
больше 4 лет назад

Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services

EPSS

Процентиль: 41%
0.0019
Низкий

Дефекты

CWE-918