A vulnerability has been discovered in the WordPress Duplicator Plugin that could allow for Arbitrary File Downloads. WordPress is a web-based publishing application implemented in PHP, and the WordPress Duplicator Plugin helps site administrators migrate and copy WordPress sites. Successful exploitation of this vulnerability could allow for Arbitrary File Downloads.
THREAT INTELLIGENCE:
There are reports that this vulnerability is being exploited in the wild.
-
WordPress Duplicator Plugin prior to 1.3.28
A vulnerability has been discovered in the WordPress Duplicator Plugin that could allow for Arbitrary File Downloads. This vulnerability exists due to the way Duplicator handles certain requests from unauthenticated users. When an attacker sends a specially crafted request to Duplicator, an unauthenticated user can download arbitrary files from the target WordPress site. This includes the 'wp-config.php' file, which contains various site configurations, and potentially database credentials. Successful exploitation of this vulnerability could allow for Arbitrary File Downloads.
-
Verify no unauthorized system modifications have occurred on system before applying patch.
-
After appropriate testing, immediately apply updates provided by Duplicator to affected systems.
-
Apply the Principle of Least Privilege to all systems and services.
-
Monitor intrusion detection systems for any signs of anomalous activity.
-
Unless required, limit external network access to affected products.
WordPress:
https://wordpress.org/plugins/duplicator/
Bleeping Computer:
https://www.tenable.com/blog/duplicator-wordpress-plugin-vulnerability-e...