{"id":3056,"date":"2016-06-13T18:22:44","date_gmt":"2016-06-13T18:22:44","guid":{"rendered":"http:\/\/musilda.cz\/?p=3056"},"modified":"2016-06-13T18:22:44","modified_gmt":"2016-06-13T18:22:44","slug":"kriticka-zranitelnost-v-pluginu-ewww-image-optimizer","status":"publish","type":"post","link":"https:\/\/affinite.io\/cs\/kriticka-zranitelnost-v-pluginu-ewww-image-optimizer\/","title":{"rendered":"Kritick\u00e1 zranitelnost v pluginu EWWW image optimizer"},"content":{"rendered":"\n
Jak uvedl t\u00fdm WordFence na sv\u00e9m blogu, v popul\u00e1rn\u00edm pluginu EWWW image optimizer, byla nalezena kritick\u00e1 zranitelnost.<\/p>\n\n\n\n
Sean Murphy, z t\u00fdmu WordFence, objevil v pluginu zranitelnost Remote Commend Execution, kter\u00e1 umo\u017e\u0148uje na multisite instalac\u00edch, z\u00edskat \u00fato\u010dn\u00edkovi kontrolu nad WordPress str\u00e1nkou. \u00dato\u010dn\u00edk m\u016f\u017ee r\u016fzn\u00fdmi zp\u016fsoby, vytvo\u0159it backdoory, kter\u00e9 mohou b\u00fdt vyu\u017eity, pro \u0161\u00ed\u0159en\u00ed malware.<\/p>\n\n\n\n
Zranitelnost, byla ozna\u010dena, pomoc\u00ed hodnot\u00edc\u00edho sk\u00f3re, jako kritick\u00e1, s hodnotou 9.6. Na\u0161t\u011bst\u00ed, autor pluginu Shane Bishiop, zareagoval velmi rychle, p\u0159es noc, vytvo\u0159il bezpe\u010dnostn\u00ed update a pokud m\u00e1te tento plugin nainstalov\u00e1n, m\u016f\u017eete jej okam\u017eit\u011b aktualizovat.<\/p>\n\n\n\n