Short Name |
HTTP:PHP:WP-INCLUDES-ACCESS |
---|---|
Severity |
Minor |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
WordPress "wp-includes" Path Remote Access |
Release Date |
2014/07/10 |
Update Number |
2397 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects improper attempts to access a WordPress-enabled website. This signature detects access to the "/wp-includes" directory of a web server. The WordPress "/wp-includes" directory is intended to store core WordPress functionality and should not contain any remote content. Web Application Scanners often will access files in this directory to determine the version of included packages (such as jQuery). This can be used to leverage version-specific follow-on attacks. Furthermore, attackers are actively compromising WordPress sites and installing "spam" websites within them. Users could be duped into purchasing fake items or be the victims of further exploit attacks. Hits on this signature could be from users following spam links. If you are not blocking on this signature and see your server respond with content, your server could be compromised.