<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5HLVVHN" height="0" width="0" style="display:none;visibility:hidden">

Vulnerability in Simple File List 5.4 exploited

Vulnerability in Simple File List 5.4 exploited

 

The new week started with a new campaign trying to widely use the Arbitrary File Upload vulnerability in the Simple File List plugin for WordPress.

We've observed 1860 unique IP addresses knocking to our sensors.

 

unique IP addresses

 

We see an attack on each second domain that Imunify360 protects.

Vulnerable endpoint is /wp-content/plugins/simple-file-list/ee-upload-engine.php :

 

simple file plugins

 

The public exploit has been available since the first of November. Cybercriminals are using it without major modifications and attempting to upload malicious files using this vulnerability. All uploaded samples are well known to the Imunify team.

We are aware of the issue, and growing exploit attempts, so a new specific ModSecurity rule with ID 77316747 is available to our customers with release 3.44.

Imunify360 users are ready and well prepared for this attack.

Should you need any further information, please do not hesitate to submit a ticket to the Imunify360 support team at cloudlinux.zendesk.com. Additionally, read our website hosting security article and learn how to keep your website secure in 2021.

Imunify360 is a comprehensive security suite for Linux web-servers. Antivirus firewall, WAF, PHP, Security Layer, Patch Management, Domain Reputation with easy UI and advanced automation. Try free to make your websites and server secure now.
TRY IMUNIFY360 NOW

 

Vulnerability in Simple File List 5.4 exploited

Vulnerability in Simple File List 5.4 exploited

 

The new week started with a new campaign trying to widely use the Arbitrary File Upload vulnerability in the Simple File List plugin for WordPress.

We've observed 1860 unique IP addresses knocking to our sensors.

 

unique IP addresses

 

We see an attack on each second domain that Imunify360 protects.

Vulnerable endpoint is /wp-content/plugins/simple-file-list/ee-upload-engine.php :

 

simple file plugins

 

The public exploit has been available since the first of November. Cybercriminals are using it without major modifications and attempting to upload malicious files using this vulnerability. All uploaded samples are well known to the Imunify team.

We are aware of the issue, and growing exploit attempts, so a new specific ModSecurity rule with ID 77316747 is available to our customers with release 3.44.

Imunify360 users are ready and well prepared for this attack.

Should you need any further information, please do not hesitate to submit a ticket to the Imunify360 support team at cloudlinux.zendesk.com. Additionally, read our website hosting security article and learn how to keep your website secure in 2021.

Imunify360 is a comprehensive security suite for Linux web-servers. Antivirus firewall, WAF, PHP, Security Layer, Patch Management, Domain Reputation with easy UI and advanced automation. Try free to make your websites and server secure now.
TRY IMUNIFY360 NOW

 

Subscribe to Imunify security Newsletter