Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 1|回復: 0

The attacker is allowed to perform any operation on the site

[複製鏈接]

1

主題

1

帖子

5

積分

新手上路

Rank: 1

積分
5
發表於 2024-12-30 14:20:39 | 顯示全部樓層 |閱讀模式
This is a very recent problem, the first attacks were recorded at the beginning of November 2018.

The WP-GDPR-Compliance plugin interacts with email list the WordPress core through admin-ajax.php to perform its functions. On the affected versions, a problem was found related to the plugin settings update operations.

Programming error allows attacker to inject and execute commands in Wordpress database

Vulnerability Exploitation
The attack is performed in two phases: inserting the value/string into the database and executing it through a do_action() call to potentially perform any action. The vulnerability falls into the privilege escalation category and is extremely insidious.

The attacker exploits the flaw to create a user with administrator permissions on the system. After the user is created, the URL is called /wp-login.php?action=registerin order to gain administrative access to the Wordpress installation. Technically, at this point, such as uploading tampered files, themes and plugins or performing mass injections on the original Wordpress files and ensuring control through remote shells.
回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

Archiver|手機版|自動贊助|GameHost抗攻擊論壇

GMT+8, 2025-1-31 01:19 , Processed in 0.568653 second(s), 26 queries .

抗攻擊 by GameHost X3.4

© 2001-2017 Comsenz Inc.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |