Plattform
wordpress
Komponente
woocommerce-sendinblue-newsletter-subscription
Behoben in
4.0.18
CVE-2024-32807 describes an Arbitrary File Access vulnerability within the Brevo for WooCommerce plugin. This flaw allows attackers to potentially read sensitive files on the server by manipulating file paths. Versions of Brevo for WooCommerce prior to 4.0.18 are affected. A patch has been released to address this vulnerability.
The Arbitrary File Access vulnerability allows an attacker to bypass intended security restrictions and access files outside of the intended web root directory. This could lead to the exposure of sensitive data such as configuration files, database credentials, or even source code. Successful exploitation could also enable an attacker to execute arbitrary code on the server if they can identify and access files containing executable scripts. The potential impact is significant, as it could compromise the entire WordPress installation and potentially lead to data breaches or complete system takeover.
CVE-2024-32807 was publicly disclosed on May 6, 2024. While no active exploitation campaigns have been publicly reported, the availability of a path traversal vulnerability significantly increases the risk of exploitation. The vulnerability is present in a widely used WordPress plugin, making it a potentially attractive target for attackers. It is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are likely to emerge given the ease of exploitation.
Websites using Brevo for WooCommerce, particularly those with older versions (≤4.0.17), are at risk. Shared hosting environments are especially vulnerable, as attackers could potentially exploit this vulnerability to gain access to other websites hosted on the same server. Sites with weak file permission configurations are also at increased risk.
• wordpress / composer / npm:
grep -r '../' /var/www/html/wp-content/plugins/brevo-sendinblue-woocommerce/*• generic web:
curl -I 'https://your-wordpress-site.com/wp-content/plugins/brevo-sendinblue-woocommerce/../../../../etc/passwd' # Attempt path traversaldisclosure
Exploit-Status
EPSS
0.50% (66% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to immediately upgrade Brevo for WooCommerce to version 4.0.18 or later. If upgrading is not immediately feasible due to compatibility issues or testing requirements, consider implementing temporary workarounds. These may include restricting file access permissions on the server, implementing a Web Application Firewall (WAF) with rules to block path traversal attempts (e.g., filtering for '../' sequences in requests), and carefully reviewing file upload configurations to prevent malicious file uploads. After upgrading, verify the fix by attempting a path traversal attack and confirming that access is denied.
Actualice el plugin Brevo for WooCommerce a una versión posterior a la 4.0.17. Esto solucionará la vulnerabilidad de path traversal que permite la descarga y eliminación arbitraria de archivos. La actualización se puede realizar directamente desde el panel de administración de WordPress.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-32807 is a HIGH severity vulnerability allowing attackers to access files on a server through Brevo for WooCommerce versions up to 4.0.17.
Yes, if you are using Brevo for WooCommerce version 4.0.17 or earlier, you are affected by this vulnerability.
Upgrade Brevo for WooCommerce to version 4.0.18 or later. Consider temporary workarounds like WAF rules if immediate upgrade is not possible.
While no active exploitation campaigns have been publicly confirmed, the vulnerability's ease of exploitation suggests a high risk of future attacks.
Refer to the Brevo security advisory for detailed information and updates: [https://security.brevo.com/](https://security.brevo.com/)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.