id: CVE-2020-24312 info: name: WordPress Plugin File Manager (wp-file-manager) Backup Disclosure author: x1m_martijn severity: high description: | mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken. remediation: | Update the WordPress Plugin File Manager (wp-file-manager) to the latest version to mitigate the backup disclosure vulnerability. reference: - https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/ - https://nvd.nist.gov/vuln/detail/CVE-2020-24312 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-24312 cwe-id: CWE-552 epss-score: 0.01622 epss-percentile: 0.86065 cpe: cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: webdesi9 product: file_manager framework: wordpress tags: cve,cve2020,wordpress,backups,plugin http: - method: GET path: - '{{BaseURL}}/wp-content/uploads/wp-file-manager-pro/fm_backup/' matchers-condition: and matchers: - type: word words: - 'Index of' - 'wp-content/uploads/wp-file-manager-pro/fm_backup' - 'backup_' condition: and - type: status status: - 200 # digest: 4a0a0047304502203ef976e5a195fbe227164c62da1138eeecae6e8c2bccd93aaf4682593bb894da022100be73afe706e59cb1f889f4fe5da8d81bc84cb6abee7876e6113f5fdebb9be0e9:922c64590222798bb761d5b6d8e72950