BuddyPress <= 14.1.0 - Authenticated (Subscriber+) Directory Traversal
Plattform
wordpress
Komponente
buddypress
Behoben in
14.1.1
CVE-2024-10011 is a Directory Traversal vulnerability discovered in the BuddyPress plugin for WordPress. This flaw allows authenticated attackers with Subscriber-level access or higher to access files outside the intended directory, potentially leading to sensitive data exposure or malicious file uploads. The vulnerability impacts versions of BuddyPress up to and including 14.1.0, and is specifically observed on Windows systems. A patch is available.
Erkenne diese CVE in deinem Projekt
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Auswirkungen und Angriffsszenarien
The primary impact of CVE-2024-10011 is the potential for unauthorized file access and manipulation. An attacker, having Subscriber-level access or greater within a WordPress site using BuddyPress, can exploit the id parameter to traverse directories and access sensitive files. This could include configuration files, source code, or even system files, depending on server permissions. The ability to upload files outside the web root presents a significant risk, as attackers could potentially place malicious code or files in locations that are not normally accessible, but could still be executed by the server. The vulnerability is limited to Windows environments, which may reduce the overall attack surface but still poses a serious threat to Windows-based WordPress deployments.
Ausnutzungskontext
CVE-2024-10011 was publicly disclosed on 2024-10-25. There is no indication of active exploitation campaigns or a KEV listing at the time of this writing. Public proof-of-concept exploits are not yet widely available, but the vulnerability's nature makes it likely that such exploits will emerge. The EPSS score is currently unknown, but the ease of exploitation and potential impact suggest a medium to high probability of exploitation if left unpatched.
Wer Ist Gefährdetwird übersetzt…
WordPress websites utilizing the BuddyPress plugin, particularly those running on Windows servers, are at risk. Shared hosting environments where users have Subscriber-level access or higher are also particularly vulnerable, as attackers can leverage this privilege to exploit the flaw. Legacy WordPress installations with outdated BuddyPress versions are also at increased risk.
Erkennungsschrittewird übersetzt…
• wordpress / composer / npm:
grep -r 'id=../' /var/www/html/wp-content/plugins/buddypress/*• generic web:
curl -I 'http://your-wordpress-site.com/wp-content/plugins/buddypress/?id=../etc/passwd' # Check for file disclosureAngriffszeitlinie
- Disclosure
disclosure
Bedrohungsanalyse
Exploit-Status
EPSS
1.31% (80% Perzentil)
CISA SSVC
CVSS-Vektor
Was bedeuten diese Metriken?
- Attack Vector
- Netzwerk — aus der Ferne über das Internet ausnutzbar. Kein physischer oder lokaler Zugriff erforderlich.
- Attack Complexity
- Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
- Privileges Required
- Niedrig — jedes gültige Benutzerkonto ist ausreichend.
- User Interaction
- Keine — automatischer und lautloser Angriff. Das Opfer tut nichts.
- Scope
- Unverändert — Auswirkung auf das anfällige Komponente beschränkt.
- Confidentiality
- Hoch — vollständiger Vertraulichkeitsverlust. Angreifer kann alle Daten lesen.
- Integrity
- Hoch — Angreifer kann beliebige Daten schreiben, ändern oder löschen.
- Availability
- Keine — kein Verfügbarkeitseinfluss.
Betroffene Software
Paketinformationen
- Aktive Installationen
- 100KBeliebt
- Plugin-Bewertung
- 4.1
- Erfordert WordPress
- 6.1+
- Kompatibel bis
- 6.8.5
- Erfordert PHP
- 5.6+
Schwachstellen-Klassifikation (CWE)
Zeitleiste
- Reserviert
- Veröffentlicht
- EPSS aktualisiert
Mitigation und Workarounds
The primary mitigation for CVE-2024-10011 is to upgrade BuddyPress to a patched version. The vendor has not released a specific fixed version in the provided data, so monitor the official BuddyPress website and WordPress plugin repository for updates. As an interim measure, implement a Web Application Firewall (WAF) rule to block requests containing suspicious directory traversal patterns in the id parameter. Specifically, look for sequences like ../ or absolute paths. Additionally, review file permissions on the server to ensure that the BuddyPress plugin directory and its contents have the minimum necessary permissions. After upgrading, confirm the fix by attempting to access files outside the intended directory using a test account with Subscriber-level access.
So behebenwird übersetzt…
Actualice el plugin BuddyPress a la última versión disponible. Esto solucionará la vulnerabilidad de recorrido de directorios. Si no puede actualizar, considere desactivar el plugin hasta que pueda realizar la actualización.
CVE-Sicherheitsnewsletter
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
Häufig gestellte Fragenwird übersetzt…
What is CVE-2024-10011 — Directory Traversal in BuddyPress?
CVE-2024-10011 is a Directory Traversal vulnerability affecting BuddyPress versions up to 14.1.0. It allows authenticated attackers to access files outside the intended directory, potentially leading to data exposure or malicious file uploads.
Am I affected by CVE-2024-10011 in BuddyPress?
You are affected if you are using BuddyPress version 14.1.0 or earlier, and your WordPress installation is on a Windows server. Check your plugin version and upgrade immediately if vulnerable.
How do I fix CVE-2024-10011 in BuddyPress?
Upgrade BuddyPress to the latest available version. Monitor the WordPress plugin repository for updates. Implement WAF rules to block suspicious requests as a temporary workaround.
Is CVE-2024-10011 being actively exploited?
As of now, there are no confirmed reports of active exploitation, but it's crucial to apply the patch promptly to prevent potential attacks.
Where can I find the official BuddyPress advisory for CVE-2024-10011?
Refer to the official WordPress plugin repository and BuddyPress project website for updates and advisories related to CVE-2024-10011.
Ist dein Projekt betroffen?
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.