Description

The Folders Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_folders_file_upload function in all versions up to, and including, 3.0.2. This makes it possible for authenticated attackers, with author access and above, to upload arbitrary files on the affected sites server which may make remote code execution possible.

Classification

Assigner:

CWE:

Links
CPEs
  • folders_pro plugin_for_wordpress 3.0.2

CVSS

CVSS version: 3.1 Base score: 8.8
Base severity: HIGH Vector: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitability score: 2.8 Impact score: 5.9

Can you explain the CVE description?

This CVE description is for a vulnerability in the Folders Pro plugin for WordPress. The vulnerability allows authenticated attackers with author access and above to upload arbitrary files on the affected sites server, potentially leading to remote code execution. The vulnerability exists in all versions of the plugin up to and including version 3.0.2. The CVSS score for this vulnerability is 8.8, indicating a high severity level. The vector CVSS (Common Vulnerability Scoring System) shows that the vulnerability has a high impact on confidentiality, integrity, and availability of the affected system. The vulnerability was published on June 14, 2024, and is classified as an EARLY_WARNING issue. The exploitability score is 2.8, and the impact score is 5.9. There are two URLs provided for more information about the vulnerability and possible mitigation steps. The first URL links to the code where the vulnerability exists in the plugin, and the second URL provides threat intelligence on the vulnerability. The CVE identifier for this vulnerability is CVE-2024-2024, and the CVE ID is 905da4e6-d410-4a26-8e37-6cd24b600101. The link to the full CVE report is /cve_reports/2024/06/cve-2024-2024.html.

How can this vulnerability be part of an attack tree?

This vulnerability can be part of an attack tree by allowing authenticated attackers with author access and above to upload arbitrary files on the affected sites server. By exploiting this vulnerability, an attacker could potentially upload a malicious file that could lead to remote code execution on the server. This could then be used to further compromise the website, steal sensitive information, or launch other attacks on the server or its users. The attack tree could include steps such as: 1. Attacker gains author access or higher on the WordPress site. 2. Attacker identifies the Folders Pro plugin and its vulnerability to arbitrary file uploads. 3. Attacker uploads a malicious file using the vulnerability. 4. Malicious file is executed on the server, leading to remote code execution. 5. Attacker gains control over the server and can further exploit the system or steal sensitive data. By including this vulnerability in an attack tree, security professionals can better understand the potential impact and risks associated with the CVE-2024-2024 vulnerability in the Folders Pro plugin for WordPress.


Generated on: 2024-07-01