WordPress Rehub theme <= 19.6.1 - Unauthenticated Local File Inclusion vulnerability
अनुवाद हो रहा है…प्लेटफ़ॉर्म
wordpress
घटक
rehub-theme
में ठीक किया गया
19.6.2
CVE-2024-31231 describes a critical Path Traversal vulnerability within the Rehub WordPress plugin. This flaw allows attackers to potentially include arbitrary files on the server, leading to sensitive data exposure or even remote code execution. The vulnerability impacts versions of Rehub up to and including 19.6.1, with a fix released in version 19.6.2.
इस CVE को अपने प्रोजेक्ट में पहचानें
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।
प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…
The core of this vulnerability lies in the improper handling of file paths within the Rehub plugin. An attacker can craft malicious requests that manipulate the pathname, bypassing intended restrictions and accessing files outside the designated directory. Successful exploitation allows for PHP Local File Inclusion (LFI), meaning an attacker can include arbitrary PHP files, potentially executing malicious code on the server. This could lead to complete compromise of the WordPress site, including data theft, modification, or defacement. The blast radius extends to any sensitive data stored on the server, including user credentials, database information, and configuration files. A successful attack could also be used to pivot to other systems on the network if the web server has access to them.
शोषण संदर्भअनुवाद हो रहा है…
CVE-2024-31231 was publicly disclosed on May 17, 2024. While no active exploitation campaigns have been definitively confirmed, the CRITICAL severity and ease of exploitation suggest a high probability of exploitation. There are currently no publicly available proof-of-concept exploits, but the vulnerability's nature makes it likely that such exploits will emerge. The vulnerability is not currently listed on the CISA KEV catalog.
कौन जोखिम में हैअनुवाद हो रहा है…
Websites using the Rehub WordPress plugin, particularly those running older versions (≤19.6.1), are at significant risk. Shared hosting environments are especially vulnerable, as they often have limited control over server configurations and plugin updates. Sites with sensitive data or those integrated with other critical systems are at the highest risk of compromise.
पहचान के चरणअनुवाद हो रहा है…
• wordpress / composer / npm:
grep -r "../" /var/www/html/wp-content/plugins/rehub/• generic web:
curl -I http://your-wordpress-site.com/wp-content/plugins/rehub/../../../../etc/passwd• wordpress / composer / npm:
wp plugin list --status=inactive | grep rehub• wordpress / composer / npm:
wp plugin update rehub --allहमले की समयरेखा
- Disclosure
disclosure
खतरा खुफिया
एक्सप्लॉइट स्थिति
EPSS
1.66% (82% शतमक)
CISA SSVC
CVSS वेक्टर
इन मेट्रिक्स का क्या मतलब है?
- Attack Vector
- नेटवर्क — इंटरनेट के माध्यम से दूरस्थ रूप से शोषण योग्य। कोई भौतिक या स्थानीय पहुंच आवश्यक नहीं।
- Attack Complexity
- उच्च — रेस कंडीशन, गैर-डिफ़ॉल्ट कॉन्फ़िगरेशन या विशिष्ट परिस्थितियों की आवश्यकता।
- Privileges Required
- कोई नहीं — बिना प्रमाणीकरण के शोषण योग्य।
- User Interaction
- कोई नहीं — स्वचालित और मूक हमला। पीड़ित कुछ नहीं करता।
- Scope
- बदला हुआ — हमला कमज़ोर घटक से परे अन्य प्रणालियों तक फैल सकता है।
- Confidentiality
- उच्च — पूर्ण गोपनीयता हानि। हमलावर सभी डेटा पढ़ सकता है।
- Integrity
- उच्च — हमलावर कोई भी डेटा लिख, बदल या हटा सकता है।
- Availability
- उच्च — पूर्ण क्रैश या संसाधन समाप्ति। पूर्ण सेवा से इनकार।
प्रभावित सॉफ्टवेयर
कमजोरी वर्गीकरण (CWE)
समयरेखा
- आरक्षित
- प्रकाशित
- संशोधित
- EPSS अद्यतन
शमन और वर्कअराउंडअनुवाद हो रहा है…
The primary mitigation is to immediately upgrade the Rehub plugin to version 19.6.2 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing temporary workarounds. Restrict file access permissions on the server to minimize the potential impact of a successful exploit. Implement strict input validation to sanitize user-supplied data used in file path construction. Web Application Firewalls (WAFs) can be configured with rules to detect and block malicious requests attempting to exploit this vulnerability. Monitor web server access logs for suspicious file access attempts.
कैसे ठीक करेंअनुवाद हो रहा है…
Actualice el tema Rehub a la última versión disponible. Si no hay una versión disponible, considere deshabilitar o reemplazar el tema hasta que se publique una actualización que corrija la vulnerabilidad. Consulte el sitio web del proveedor para obtener más información y actualizaciones.
CVE सुरक्षा न्यूज़लेटर
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…
What is CVE-2024-31231 — Path Traversal in Rehub WordPress Plugin?
CVE-2024-31231 is a critical Path Traversal vulnerability in the Rehub WordPress plugin allowing attackers to potentially include arbitrary files, leading to code execution.
Am I affected by CVE-2024-31231 in Rehub WordPress Plugin?
If you are using Rehub version 19.6.1 or earlier, you are affected by this vulnerability. Immediate action is required.
How do I fix CVE-2024-31231 in Rehub WordPress Plugin?
Upgrade the Rehub plugin to version 19.6.2 or later to resolve the vulnerability. If upgrading is not possible, implement temporary workarounds like restricting file access.
Is CVE-2024-31231 being actively exploited?
While no active exploitation campaigns have been confirmed, the CRITICAL severity and ease of exploitation suggest a high probability of exploitation.
Where can I find the official Rehub advisory for CVE-2024-31231?
Refer to the official Rehub plugin website and WordPress plugin repository for the latest advisory and update information.
क्या आपका प्रोजेक्ट प्रभावित है?
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।