WordPress.Plugin.WP.Guru.Log.Download.Arbitrary.File.Read
Description
This indicates an attack attempt to exploit an Arbitrary File Read Vulnerability in Error Log Viewer WordPress Plugin.
The vulnerability is due to improper validation of user-supplied inputs. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation of this vulnerability could lead to information disclosure from the target server.
Affected Products
WordPress Error Log Viewer Plugin prior to 1.0.1.3
Impact
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://wordpress.org/plugins/error-log-viewer-wp/
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |