29 Nov 2018

Vulnerability Details: Information Disclosure Vulnerability in User Spam Remover

In tomorrow’s Not Really a WordPress Plugin Vulnerability post we will be mentioning a number of false reports of vulnerabilities from someone going as “KingSkrupellos from Cyberizm Digital Security”, who doesn’t seem to really understand what they are writing about, but in the case of their claim of a “database backup disclosure vulnerability” in User Spam Remover, they did identify a security issue, though not quite the one they are claiming. While they claim a file generated by the plugin at /wp-content/plugins/user-spam-remover/log/userspamremover.restore.sql is a “database backup”, it actually is a log of any users removed from the plugin, which involves database entries. Since it is intended to contain spam accounts, the value of that information stored in in it would seem to be somewhat limited in most isntances. There is also an activity log by default stored at /wp-content/plugins/user-spam-remover/log/userspamremover.log

...


This post provides insights on a vulnerability in the WordPress plugin User Spam Remover not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.

If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.

For existing customers, please log in to your account to view the rest of the contents of the post.

Leave a Reply

Your email address will not be published.