|
|||
Rule General Information |
---|
Release Date: | 2024-10-29 | |
Rule Name: | Time Clock Remote Code Execution Vulnerability (CVE-2024-9593) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://www.wordfence.com/threat-intel/vulnerabilities/id/247e599a-74e2-41d5-a1ba-978a807e6544 https://plugins.trac.wordpress.org/browser/time-clock/tags/1.2.2/includes/admin/ajax_functions_admin.php https://plugins.trac.wordpress.org/changeset/3171046/time-clock https://cxsecurity.com/cveshow/CVE-2024-9593/ |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: https://www.wordfence.com/threat-intel/vulnerabilities/id/247e599a-74e2-41d5-a1ba-978a807e6544 |