|
|||
Rule General Information |
---|
Release Date: | 2024-11-19 | |
Rule Name: | WordPress Debug Tool Plugin Arbitrary File Upload Vulnerability (CVE-2024-10586) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution. | |
Impact: | Attackers can upload viruses, Trojans, WebShell, other malicious scripts or pictures containing scripts to the server, and attackers can use these files for subsequent attacks. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://plugins.trac.wordpress.org/browser/debug-tool/trunk/tools/image-puller.php#L120 https://www.wordfence.com/threat-intel/vulnerabilities/id/5e9d5c93-dcd7-450e-8c52-5c95fc5473d2?source=cve |
|
Solutions |
---|
Please refer to announcements or patches release by the vendor: https://www.wordfence.com/threat-intel/vulnerabilities/id/5e9d5c93-dcd7-450e-8c52-5c95fc5473d2 |