By allowing the website admin to duplicate the, As the name suggests, the plugin facilitates the migration of site WordPress site... Indeed, the installer php and installer-backup php files can be reused after the restoration process to inject malicious PHP code in the wp-config php file. By removing or rewriting its wp, On Friday, researchers at Sucuri had been seeing in the number of cases where attackers are disabling WordPress sites simply-config php file... These cases are all linked to the same WordPress Duplicator Plugin, said Peter Gramantik, researcher with Sucuri.. To eliminate the risk of attack, you can check your folder and remove the installer php file. The flaw becomes exposed wrote Mikey Veenstra, in Wordfence bulletin... From there, the attacker can login using their own admin user accounts, and upload malicious plugin or order to compromise the site, wrote Matt Barry, Wordfence in email interview with Threatpost.. it's difficult to estimate how many are impacted by the bug. By the fact that vulnerable users would have to meet the following conditions, Sucuri researchers note that the group of impacted users might further be winnowed down. The company published the advisory of the vulnerability on Aug 29..
Read more