CISA KEV 정보
| 취약점명 | WordPress Snap Creek Duplicator Plugin File Download Vulnerability |
|---|---|
| 설명 | WordPress Snap Creek Duplicator plugin contains a file download vulnerability when an administrator creates a new copy of their site that allows an attacker to download the generated files from their Wordpress dashboard. This vulnerability affects Duplicator and Dulplicator Pro. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-22 |
| 등록일 (KEV) | 2021-11-03 |
| 조치 기한 | 2022-05-03 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2020-11738 |
NVD 상세 정보
CVSS v3.1: 7.5 HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NCVSS v3.0: 7.5 HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NCVSS v2.0: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N설명: The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.
CWE: CWE-22 | CWE-22
참조
- http://packetstormsecurity.com/files/160621/WordPress-Duplicator-1.3.26-Directory-Traversal-File-Read.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/164533/WordPress-Duplicator-1.3.26-Arbitrary-File-Read.html [Exploit, Third Party Advisory, VDB Entry]
- https://cwe.mitre.org/data/definitions/23.html [Not Applicable]
- https://snapcreek.com/duplicator/docs/changelog/?lite [Release Notes, Vendor Advisory]
- https://www.wordfence.com/blog/2020/02/active-attack-on-recently-patched-duplicator-plugin-vulnerability-affects-over-1-million-sites/ [Exploit, Third Party Advisory]
- http://packetstormsecurity.com/files/160621/WordPress-Duplicator-1.3.26-Directory-Traversal-File-Read.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/164533/WordPress-Duplicator-1.3.26-Arbitrary-File-Read.html [Exploit, Third Party Advisory, VDB Entry]
- https://cwe.mitre.org/data/definitions/23.html [Not Applicable]
- https://snapcreek.com/duplicator/docs/changelog/?lite [Release Notes, Vendor Advisory]
- https://www.wordfence.com/blog/2020/02/active-attack-on-recently-patched-duplicator-plugin-vulnerability-affects-over-1-million-sites/ [Exploit, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-11738 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.