WordPress.WooCommerce.Checkout.Manager.Arbitrary.File.Upload

description-logoDescription

This indicates an attack attempt against an Arbitrary File Upload vulnerability in WordPress WooCommerce Checkout Manager Plugin.
The vulnerability is due to insufficient sanitizing of user supplied inputs when handling a crafted file upload. It allows a remote attacker to upload an arbitrary file onto vulnerable systems via a crafted HTTP request.

affected-products-logoAffected Products

WordPress WooCommerce Checkout Manager Plugin 4.2.6 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://wordpress.org/plugins/woocommerce-checkout-manager/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-05-23 14.619 Default_action:pass:drop
2019-05-10 14.612

References

9262