Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.813455 |
Categoría: | Web application abuses |
Título: | WordPress Arbitrary File Deletion Vulnerability (Jun 2018) - Linux |
Resumen: | WordPress is prone to an arbitrary file deletion vulnerability. |
Descripción: | Summary: WordPress is prone to an arbitrary file deletion vulnerability. Vulnerability Insight: The flaw exists due to an insufficient sanitization of user input data in the 'wp-includes/post.php' script before passing on to a file deletion function. Vulnerability Impact: Successful exploitation will allow remote attackers to delete any file of the wordPress installation and any other file on the server on which the PHP process user has the proper permissions to delete. Also capability of arbitrary file deletion can be used to circumvent some security measures and execute arbitrary code on the webserver. Affected Software/OS: All wordPress versions through version 4.9.6. Solution: Update to version 4.9.7. CVSS Score: 6.5 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-12895 |
Copyright | Copyright (C) 2018 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |