{"id":4639,"date":"2024-08-30T20:25:25","date_gmt":"2024-08-30T20:25:25","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/"},"modified":"2024-08-30T20:25:25","modified_gmt":"2024-08-30T20:25:25","slug":"vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/","title":{"rendered":"Vulnerabilidad en WP Cerber Security <= 9.4 – Bypass de Protecci\u00f3n por IP"},"content":{"rendered":"
La vulnerabilidad CVE-2022-4100 afecta al plugin de seguridad WP Cerber en versiones hasta 9.4, permitiendo a un atacante evadir la protecci\u00f3n por IP al no verificar correctamente la direcci\u00f3n IP del visitante.<\/div>\n

<\/p>\n

La falla en el mecanismo de protecci\u00f3n por IP del plugin WP Cerber Security hasta la versi\u00f3n 9.4 permite a un atacante cuya direcci\u00f3n IP ha sido bloqueada evadir este control al establecer la cabecera HTTP X-Forwarded-For: a una direcci\u00f3n IP que no ha sido bloqueada. Como soluci\u00f3n temporal, se recomienda actualizar el plugin a la \u00faltima versi\u00f3n disponible y configurar reglas de firewall adicionales para bloquear direcciones IP maliciosas.<\/div>\n
Es fundamental mantener actualizados todos los plugins de WordPress y tomar medidas proactivas para fortalecer la seguridad del sitio web, evitando as\u00ed posibles ataques como el bypass de protecci\u00f3n por IP en WP Cerber Security.<\/div>\n","protected":false},"excerpt":{"rendered":"

La vulnerabilidad CVE-2022-4100 afecta al plugin de seguridad WP Cerber en versiones hasta 9.4, permitiendo a un atacante evadir la protecci\u00f3n por IP al no verificar correctamente la direcci\u00f3n IP del visitante. La falla en el mecanismo de protecci\u00f3n por IP del plugin WP Cerber Security hasta la versi\u00f3n 9.4 permite a un atacante cuya […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2328],"class_list":["post-4639","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2022-4100"],"yoast_head":"\nVulnerabilidad en WP Cerber Security <= 9.4 - Bypass de Protecci\u00f3n por IP - SeguridadWordPress.es<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilidad en WP Cerber Security <= 9.4 - Bypass de Protecci\u00f3n por IP - SeguridadWordPress.es\" \/>\n<meta property=\"og:description\" content=\"La vulnerabilidad CVE-2022-4100 afecta al plugin de seguridad WP Cerber en versiones hasta 9.4, permitiendo a un atacante evadir la protecci\u00f3n por IP al no verificar correctamente la direcci\u00f3n IP del visitante. La falla en el mecanismo de protecci\u00f3n por IP del plugin WP Cerber Security hasta la versi\u00f3n 9.4 permite a un atacante cuya […]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/\" \/>\n<meta property=\"og:site_name\" content=\"SeguridadWordPress.es\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-30T20:25:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/\",\"url\":\"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/\",\"name\":\"Vulnerabilidad en WP Cerber Security <= 9.4 - Bypass de Protecci\u00f3n por IP - SeguridadWordPress.es\",\"isPartOf\":{\"@id\":\"http:\/\/127.0.0.1\/#website\"},\"datePublished\":\"2024-08-30T20:25:25+00:00\",\"dateModified\":\"2024-08-30T20:25:25+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/127.0.0.1\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilidad en WP Cerber Security <= 9.4 – Bypass de Protecci\u00f3n por IP\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/127.0.0.1\/#website\",\"url\":\"http:\/\/127.0.0.1\/\",\"name\":\"SeguridadWordPress.es\",\"description\":\"Recopilaci\u00f3n de vulnerabilidades WordPress.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/127.0.0.1\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilidad en WP Cerber Security <= 9.4 - Bypass de Protecci\u00f3n por IP - SeguridadWordPress.es","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerabilidad en WP Cerber Security <= 9.4 - Bypass de Protecci\u00f3n por IP - SeguridadWordPress.es","og_description":"La vulnerabilidad CVE-2022-4100 afecta al plugin de seguridad WP Cerber en versiones hasta 9.4, permitiendo a un atacante evadir la protecci\u00f3n por IP al no verificar correctamente la direcci\u00f3n IP del visitante. La falla en el mecanismo de protecci\u00f3n por IP del plugin WP Cerber Security hasta la versi\u00f3n 9.4 permite a un atacante cuya […]","og_url":"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/","og_site_name":"SeguridadWordPress.es","article_published_time":"2024-08-30T20:25:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/","url":"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/","name":"Vulnerabilidad en WP Cerber Security <= 9.4 - Bypass de Protecci\u00f3n por IP - SeguridadWordPress.es","isPartOf":{"@id":"http:\/\/127.0.0.1\/#website"},"datePublished":"2024-08-30T20:25:25+00:00","dateModified":"2024-08-30T20:25:25+00:00","author":{"@id":""},"breadcrumb":{"@id":"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/127.0.0.1\/vulnerabilidad-en-wp-cerber-security-9-4-bypass-de-proteccion-por-ip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/127.0.0.1\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilidad en WP Cerber Security <= 9.4 – Bypass de Protecci\u00f3n por IP"}]},{"@type":"WebSite","@id":"http:\/\/127.0.0.1\/#website","url":"http:\/\/127.0.0.1\/","name":"SeguridadWordPress.es","description":"Recopilaci\u00f3n de vulnerabilidades WordPress.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/127.0.0.1\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"amp_enabled":true,"_links":{"self":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/4639"}],"collection":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=4639"}],"version-history":[{"count":0,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/posts\/4639\/revisions"}],"wp:attachment":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=4639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/categories?post=4639"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/tags?post=4639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}