WordPress.Landing.Pages.Plugin.OS.Commands.Injection
Description
This indicates an attack attempt to exploit an OS Command Injection vulnerability in Wordpress Landing Pages plugin.
The vulnerability is caused by a lack of sanitizing of the "url" parameter that is passed to "server.php". A remote attacker can exploit this to send a crafted request to execute OS commands on a vulnerable server.
Affected Products
Landing Pages 1.8.8 to 1.9.0
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Upgrade to the latest version available from the website.
https://wordpress.org/plugins/landing-pages/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-02-01 | 14.540 | Name:Wordpress. Landing. Pages. Plugin. OS. Commands. Injection:WordPress. Landing. Pages. Plugin. OS. Commands. Injection |