id: CVE-2020-24312 info: name: WordPress Plugin File Manager (wp-file-manager) Backup Disclosure author: x1m_martijn severity: high description: | mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken. remediation: | Update the WordPress Plugin File Manager (wp-file-manager) to the latest version to mitigate the backup disclosure vulnerability. reference: - https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - https://nvd.nist.gov/vuln/detail/CVE-2020-24312 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-24312 cwe-id: CWE-552 epss-score: 0.01622 epss-percentile: 0.8605 cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: webdesi9 product: file_manager framework: wordpress tags: cve,cve2020,wordpress,backups,plugin http: - method: GET path: - '{{BaseURL}}/wp-content/uploads/wp-file-manager-pro/fm_backup/' matchers-condition: and matchers: - type: word words: - 'Index of' - 'wp-content/uploads/wp-file-manager-pro/fm_backup' - 'backup_' condition: and - type: status status: - 200 # digest: 4a0a00473045022078bd8d954a276a44eaf3d2b13bbdeb9e3a08cceaac204ad348cf84b784114ed7022100d274283a165d3044e35dbe1ccc08feef61d4bbc2bd93395dd8ed2f39f108d459:922c64590222798bb761d5b6d8e72950