EU Regulating InfoSec: How Detectify helps achieving NIS 2 and DORA compliance
**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are very passionate about cybersecurity rules and …
On November 6th, 2019, Detectify added security tests for 50+ of the most popular WordPress plugins, including Easy-WP-SMTP. Although the zero-day affecting Easy-WP-SMTP (CVE-2020-35234) was recently patched, WordPress estimates that many of the 500,000+ active installs of the plugin remain unpatched. Detectify scans your applications for this vulnerability and alerts you if you are running a vulnerable version of WordPress and WordPress plugins.
The issue involves a Sensitive Data Exposure vulnerability (CVE-2020-35234) that allows attackers to take over your WordPress Administrator account by finding and resetting the Administrator password in improperly secured log files. Because the folder where log files are stored do not have an index file, if directory listing is enabled on the web server, then an attacker could:
Unpatched WordPress Easy WP SMTP installs version 1.4.2 or earlier.
Immediately upgrade to Easy-WP-SMTP version 1.4.4.
Detectify has been able to detect improperly secured log files for the Easy-WP-SMTP plugin since November 2019. Earlier this month, Detectify updated our in-tool Easy-WP-SMTP Log Disclosure security tests with references and findings text to provide additional information to affected customers.
Detectify detects similar vulnerabilities in the most popular WordPress plugins. We suspect that other plugins may also store sensitive data that can be abused by attackers, so we strongly recommend checking all of your plugins.
Detectify is a continuous web scanner and monitoring service that can be set up for automated scanning for 2000+ known vulnerabilities including the OWASP Top 10 and WordPress plugin vulnerabilities. Start your free 2-week trial today and check for the latest vulnerabilities!
**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are very passionate about cybersecurity rules and …
TLDR: This article details methods and tools (from DNS records and IP addresses to HTTP analysis and HTML content) that practitioners can use to classify …