WordPress The Novel Design Store Directory plugin <= 4.3.0 - Arbitrary File Upload vulnerability
翻译中…平台
wordpress
组件
noveldesign-store-directory
修复版本
4.3.1
CVE-2024-51788 is an Arbitrary File Access vulnerability affecting The Novel Design Store Directory. Attackers can exploit this flaw to upload malicious files, including web shells, granting them unauthorized control over the web server. This vulnerability impacts versions of The Novel Design Store Directory up to and including 4.3.0. A patch is available in version 4.3.1.
检测此 CVE 是否影响你的项目
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。
影响与攻击场景翻译中…
The primary impact of CVE-2024-51788 is the ability for an attacker to upload a web shell to the server. A web shell is a malicious script that allows an attacker to execute arbitrary commands on the server as if they were a legitimate administrator. This can lead to complete server compromise, including data exfiltration, modification, or deletion. The attacker could also use the compromised server as a launchpad for further attacks against other systems on the network, achieving lateral movement. The blast radius extends beyond the affected directory, potentially impacting any data or services hosted on the same server. The unrestricted file upload nature of this vulnerability makes it particularly dangerous, as it bypasses typical security controls designed to prevent malicious file uploads.
利用背景翻译中…
CVE-2024-51788 was published on November 11, 2024. Its critical CVSS score (10) indicates a high probability of exploitation. While no public Proof-of-Concept (POC) exploits have been widely reported, the ease of exploiting arbitrary file upload vulnerabilities suggests that it could become a target for automated scanning and exploitation. The vulnerability's presence on the NVD (National Vulnerability Database) increases the likelihood of exploitation attempts. EPSS score is likely to be high, reflecting the severity and potential for widespread exploitation.
威胁情报
漏洞利用状态
EPSS
29.62% (97% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 已改变 — 攻击可以超出脆弱组件,影响其他系统。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2024-51788 is to immediately upgrade to version 4.3.1 of The Novel Design Store Directory. If upgrading is not immediately feasible, consider implementing temporary workarounds. These may include restricting file upload types to only explicitly allowed extensions, implementing stricter file size limits, and enabling server-side validation of uploaded files. Web Application Firewalls (WAFs) can be configured with rules to block suspicious file uploads and detect web shell activity. Monitor server logs for unusual file activity or command execution attempts. After upgrading, confirm the vulnerability is resolved by attempting to upload a test file with a known dangerous extension (e.g., .php) and verifying that the upload is rejected.
修复方法翻译中…
Actualice el plugin The Novel Design Store Directory a la última versión disponible. La vulnerabilidad permite la subida de archivos arbitrarios, lo que podría comprometer la seguridad del sitio web. La actualización corrige esta vulnerabilidad.
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2024-51788 — Arbitrary File Access in The Novel Design Store Directory?
It's a critical Arbitrary File Access vulnerability in The Novel Design Store Directory allowing attackers to upload malicious files, potentially gaining full server control.
Am I affected by CVE-2024-51788 in The Novel Design Store Directory?
If you are using The Novel Design Store Directory versions 4.3.0 or earlier, you are vulnerable to this exploit.
How do I fix CVE-2024-51788 in The Novel Design Store Directory?
Upgrade to version 4.3.1 immediately. If upgrading isn't possible, implement temporary workarounds like restricting file types and sizes.
Is CVE-2024-51788 being actively exploited?
While no widespread exploitation is currently reported, the vulnerability's severity and ease of exploitation make it a likely target.
Where can I find the official The Novel Design Store Directory advisory for CVE-2024-51788?
Refer to the National Vulnerability Database (NVD) entry for CVE-2024-51788 and the vendor's security advisory for further details.