JS Help Desk – The Ultimate Help Desk & Support Plugin <= 2.8.6 - Inyección de Código PHP No Autenticado a Ejecución Remota de Código
Plataforma
wordpress
Componente
js-support-ticket
Corregido en
2.8.7
CVE-2024-7094 is a critical Remote Code Execution (RCE) vulnerability discovered in the JS Help Desk – The Ultimate Help Desk & Support Plugin for WordPress. This flaw allows unauthenticated attackers to execute arbitrary code on the server due to insufficient input sanitization within the 'storeTheme' function. Versions of the plugin up to and including 2.8.6 are affected, and a full fix is available in version 2.8.7.
Detecta esta CVE en tu proyecto
Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.
Impacto y Escenarios de Ataquetraduciendo…
The impact of CVE-2024-7094 is severe. Successful exploitation allows an attacker to execute arbitrary PHP code on the web server hosting the WordPress site. This can lead to complete server compromise, including data theft, modification, or deletion. Attackers could also leverage this access to install malware, create backdoors for persistent access, or launch further attacks against other systems on the network. The lack of authentication requirements significantly broadens the attack surface, making it accessible to a wide range of malicious actors.
Contexto de Explotacióntraduciendo…
CVE-2024-7094 was publicly disclosed on August 13, 2024. While no active exploitation campaigns have been definitively confirmed, the CRITICAL severity and ease of exploitation suggest a high likelihood of exploitation attempts. Public proof-of-concept code is likely to emerge, further increasing the risk. This vulnerability is not currently listed on the CISA KEV catalog.
Quién Está en Riesgotraduciendo…
WordPress websites using the JS Help Desk plugin, particularly those running versions prior to 2.8.7, are at significant risk. Shared hosting environments are especially vulnerable, as a compromise of one site can potentially impact others on the same server. Sites with weak WordPress security configurations or those lacking regular plugin updates are also at increased risk.
Pasos de Deteccióntraduciendo…
• wordpress / composer / npm:
grep -r 'storeTheme' /var/www/html/wp-content/plugins/js-help-desk/• wordpress / composer / npm:
wp plugin list --status=all | grep 'JS Help Desk'• wordpress / composer / npm:
wp plugin update js-help-desk• generic web: Check WordPress plugin directory for updates and security advisories related to JS Help Desk.
Cronología del Ataque
- Disclosure
disclosure
Inteligencia de Amenazas
Estado del Exploit
EPSS
71.96% (99% percentil)
CISA SSVC
Vector CVSS
¿Qué significan estas métricas?
- Attack Vector
- Red — explotable remotamente por internet. Sin acceso físico ni local. Mayor superficie de ataque.
- Attack Complexity
- Baja — sin condiciones especiales. El atacante puede explotar de forma confiable sin configuraciones raras.
- Privileges Required
- Ninguno — sin autenticación. No se necesitan credenciales para explotar.
- User Interaction
- Ninguna — el ataque es automático y silencioso. La víctima no hace nada.
- Scope
- Sin cambio — el impacto se limita al componente vulnerable.
- Confidentiality
- Alto — pérdida total de confidencialidad. El atacante puede leer todos los datos.
- Integrity
- Alto — el atacante puede escribir, modificar o eliminar cualquier dato.
- Availability
- Alto — caída completa o agotamiento de recursos. Denegación de servicio total.
Software Afectado
Información del paquete
- Instalaciones activas
- 8KConocido
- Valoración del plugin
- 3.8
- Requiere WordPress
- 5.5+
- Compatible hasta
- 6.9.4
- Requiere PHP
- 7.4+
Clasificación de Debilidad (CWE)
Cronología
- Reservado
- Publicada
- EPSS actualizado
Mitigación y Workaroundstraduciendo…
The primary mitigation for CVE-2024-7094 is to immediately upgrade the JS Help Desk plugin to version 2.8.7 or later. If upgrading is not immediately feasible, consider implementing a temporary workaround by restricting access to the 'storeTheme' function. This could involve modifying the plugin's code (with caution and thorough testing) or using a WordPress security plugin to block access to the vulnerable endpoint. Monitor WordPress access logs for suspicious activity related to the 'storeTheme' function. After upgrading, confirm the fix by attempting to trigger the vulnerability via a controlled test – ensure no code execution occurs.
Cómo corregirlo
Actualice el plugin JS Help Desk – The Ultimate Help Desk & Support Plugin a la versión 2.8.7 o superior. Esta versión corrige la vulnerabilidad de inyección de código PHP que permite la ejecución remota de código.
Boletín de seguridad CVE
Análisis de vulnerabilidades y alertas críticas directamente en tu correo.
Preguntas frecuentestraduciendo…
What is CVE-2024-7094 — RCE in JS Help Desk WordPress Plugin?
CVE-2024-7094 is a critical Remote Code Execution vulnerability in the JS Help Desk WordPress plugin, allowing attackers to execute code on the server if you're using versions up to 2.8.6.
Am I affected by CVE-2024-7094 in JS Help Desk WordPress Plugin?
Yes, if you are using the JS Help Desk plugin version 2.8.6 or earlier, you are vulnerable to this RCE vulnerability. Upgrade immediately.
How do I fix CVE-2024-7094 in JS Help Desk WordPress Plugin?
Upgrade the JS Help Desk plugin to version 2.8.7 or later to resolve this vulnerability. If immediate upgrade isn't possible, consider temporary workarounds like restricting access to the 'storeTheme' function.
Is CVE-2024-7094 being actively exploited?
While no confirmed active exploitation campaigns have been reported, the CRITICAL severity and ease of exploitation suggest a high likelihood of exploitation attempts.
Where can I find the official JS Help Desk advisory for CVE-2024-7094?
Refer to the JS Help Desk plugin's official website and WordPress plugin repository for the latest security advisory and update information.
¿Tu proyecto está afectado?
Sube tu archivo de dependencias y detecta esta y otras CVEs al instante.