DOS vulnerability
-
Hi,
Reading the code of your plugin, I think you have a DOS vulnerability. An unauthenticated, not-logged-in user can make calls to tux_handle_upload.php directly. That file performs no authentication, and will write as much attacker-controlled data to disk as requested to, until the disk is completely filled.
The plupload URL shouldn’t point directly to a script that performs no authentication like that – it should point to admin-ajax.php, and use WP’s authentication system to ensure that the uploader is a logged-in, authorised user. See in UpdraftPlus (updraftplus/admin.php) for an example.
David
Viewing 2 replies - 1 through 2 (of 2 total)
Viewing 2 replies - 1 through 2 (of 2 total)
- The topic ‘DOS vulnerability’ is closed to new replies.