id: CVE-2020-24312 info: name: WordPress Plugin File Manager (wp-file-manager) Backup Disclosure author: x1m_martijn severity: high description: | mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken. impact: | This vulnerability can lead to unauthorized access to sensitive information, such as database backups, configuration files, and other sensitive data. remediation: | Update the WordPress Plugin File Manager (wp-file-manager) to the latest version to mitigate the backup disclosure vulnerability. reference: - https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - https://nvd.nist.gov/vuln/detail/CVE-2020-24312 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/StarCrossPortal/scalpel classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-24312 cwe-id: CWE-552 epss-score: 0.01622 epss-percentile: 0.87473 cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: webdesi9 product: file_manager framework: wordpress tags: cve,cve2020,wordpress,backups,plugin,webdesi9 http: - method: GET path: - '{{BaseURL}}/wp-content/uploads/wp-file-manager-pro/fm_backup/' matchers-condition: and matchers: - type: word words: - 'Index of' - 'wp-content/uploads/wp-file-manager-pro/fm_backup' - 'backup_' condition: and - type: status status: - 200 # digest: 490a0046304402201c98c927aeafcbd1a6adf21b5d21faf57aab5c79a2a58d2cdfec24bf064a1c9d022072cd720a6236cc17b4aeb69b4aeeb9ad1a5fa0285b4f437055d27674847d55c2:922c64590222798bb761d5b6d8e72950