id: CVE-2020-24312 info: name: WordPress Plugin File Manager (wp-file-manager) Backup Disclosure author: x1m_martijn severity: high description: | mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken. remediation: | Update the WordPress Plugin File Manager (wp-file-manager) to the latest version to mitigate the backup disclosure vulnerability. reference: - https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - https://nvd.nist.gov/vuln/detail/CVE-2020-24312 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-24312 cwe-id: CWE-552 epss-score: 0.01622 epss-percentile: 0.86058 cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: webdesi9 product: file_manager framework: wordpress tags: cve,cve2020,wordpress,backups,plugin http: - method: GET path: - '{{BaseURL}}/wp-content/uploads/wp-file-manager-pro/fm_backup/' matchers-condition: and matchers: - type: word words: - 'Index of' - 'wp-content/uploads/wp-file-manager-pro/fm_backup' - 'backup_' condition: and - type: status status: - 200 # digest: 4a0a00473045022100ff8932e5242f5c19a6119b63aaad79a2aecb86aeb6757818ecf95d1b6df3eb220220464466571d5601b6208b34757c257cdb073cd1d401577198c4d6efc5fd48b7d5:922c64590222798bb761d5b6d8e72950