CVE-2020-24144
📋 TL;DR
This vulnerability allows attackers to perform directory traversal attacks via the items[] parameter in move operations in the Media File Organizer WordPress plugin. Attackers can access files stored outside the web root folder, potentially exposing sensitive system files. WordPress sites using version 1.0.1 of this plugin are affected.
💻 Affected Systems
- WordPress Media File Organizer plugin
📦 What is this software?
Media File Organizer by Media File Organizer Project
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through reading sensitive files like /etc/passwd, /etc/shadow, or database credentials, leading to full site takeover and potential lateral movement.
Likely Case
Unauthorized access to sensitive files containing configuration data, user information, or backup files, potentially enabling further attacks.
If Mitigated
Limited impact with proper file permissions and web server configurations that restrict access to sensitive directories.
🎯 Exploit Status
Exploitation requires authenticated access to WordPress with appropriate permissions to use the plugin's move functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.2 or later
Vendor Advisory: https://ru.wordpress.org/plugins/media-file-organizer/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Media File Organizer. 4. Click 'Update Now' if available. 5. If no update available, deactivate and delete the plugin.
🔧 Temporary Workarounds
Disable plugin
allDeactivate the Media File Organizer plugin to prevent exploitation
wp plugin deactivate media-file-organizer
Restrict file access
linuxConfigure web server to deny access to sensitive directories
# Add to .htaccess for Apache:
<FilesMatch "\.(php|inc|conf|sql|log|txt)$">
Order Allow,Deny
Deny from all
</FilesMatch>
🧯 If You Can't Patch
- Remove plugin entirely from the WordPress installation
- Implement strict file permission controls and disable directory traversal at web server level
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Media File Organizer → Version. If version is 1.0.1, system is vulnerable.
Check Version:
wp plugin get media-file-organizer --field=version
Verify Fix Applied:
Verify plugin version is 1.0.2 or later, or confirm plugin is deactivated/removed.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in web server logs
- Multiple requests with '../' sequences in parameters
- Access attempts to sensitive system files
Network Indicators:
- HTTP requests containing '../' sequences in items[] parameter
- Unusual file paths in move operation requests
SIEM Query:
web.url:*items%5B%5D=..%2F* OR web.url:*items[]=../*