Description
Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-16877 | Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:05:11.916Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-24141
No data.
Status : Modified
Published: 2021-07-07T14:15:09.637
Modified: 2024-11-21T05:14:25.627
Link: CVE-2020-24141
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD