HOW TO FIX A CRITICAL 0-DAY WORDPRESS PLUGINS VULNERABILITY (CVE-2021-24370) FOUND IN FANCY PRODUCT DESIGNER
THESECMASTER
The Wordfence Threat Intelligence team has discovered a critical 0-day WordPress plugins vulnerability (CVE-2021-24370) on May 31, 2021. This file upload vulnerability is being manipulated in the Fancy Product Designer, a WordPress plugin installed on over 17,000 websites. As it’s a critical 0-day WordPress plugins vulnerability (CVE-2021-24370) under attack, it’s important to have a brief introduction about WordPress and its plugins.
* What Is WordPress? What Is WordPress Plugin?
* What Is A Zero-Day Vulnerability?
* Introducing Fancy Product Designer
* How Are Attackers Abusing This 0-day WordPress Plugins Vulnerability (CVE-2021-24370)?
* Targets Of This 0-day WordPress Plugins Vulnerability (CVE-2021-24370)
* Summary Of This 0-day WordPress Plugins Vulnerability (CVE-2021-24370)
* How To Fix A Critical 0-Day WordPress Plugins Vulnerability (CVE-2021-24370)?
* Indicator Of Compromise Recorded During The Analysis of 0-day WordPress Plugins Vulnerability (CVE-2021-24370)
* Countermeasures Suggested By WordPress
* #1. Statistical Techniques
* #2. Behavior-Based Defense
* #3. Signature-Based Defense
* #4. Hybrid Techniques
Table of Contents :
1. login to codecanyon.net.
2. visit the product page at https://codecanyon.net/item/fancy-product-designer-woocommercewordpress/6318393
3. Download the plugin file from the right-hand side of the product page.
4. After your download the patched version of the plugin Fancy Product Designer v4.6.9.
5. Login to your WordPress site.
6. Go to Plugins->Add New->Upload Plugin to upload the patched plugin.
7. Activate the plugin if not activated.
How to Fix Fancy Product Designer vulnerability CVE-2021-24370
Tumblr
Telegram
Medium
Twitter
LinkedIn
Facebook
FOLLOW US:
THESECMASTER