1
jlmzzz 2023-03-05 15:30:47 +08:00
WordPress XML-RPC Pingback Vulnerability
Threat XML-RPC in WordPress is an API which allows developers who make third party application and services the ability to interact to your WordPress site using features like Trackbacks and Pingbacks. The Pingback feature of XML-RPC API allows attacks like DDOS and Server-Side Request Forgery (SSRF) either against the server hosting WordPress or against a target server. QID Detection Logic: This detection sends a POST request with XML data with invalid URL to verify the presence of vulnerability. Impact On Successful exploitation, an attacker can control a WordPress site to conduct DDOS or Server-Side Request Forgery (SSRF) attack against a target server. Solution Remove "pingback.ping" method from XML-RPC. |
2
00chang 2023-03-05 15:47:49 +08:00
The xmlrpc.php file is a critical part of the WordPress CMS system, which is responsible for handling remote API requests. However, it has been found that the Pingback feature in XML-RPC API has a vulnerability that allows attackers to conduct DDOS or Server-Side Request Forgery (SSRF) attacks.
Therefore, it's essential to ensure that the Pingback feature is disabled on the WordPress site by removing the "pingback.ping" method from XML-RPC to minimize the risk of attacks. It's also recommended to keep the WordPress site and all plugins and themes up-to-date to stay protected from known vulnerabilities. chatgpt 的回复 |
3
janus77 2023-03-05 16:01:22 +08:00
楼上太吓人了
|
4
guxin0123 2023-03-06 10:15:27 +08:00
建议装一个 wordfence 插件, 按照提示仔细检查一下
|