Lucene search

K
vulnrichmentWordfenceVULNRICHMENT:CVE-2024-7627
HistorySep 05, 2024 - 2:04 a.m.

CVE-2024-7627 Bit File Manager 6.0 - 6.5.5 - Unauthenticated Remote Code Execution via Race Condition

2024-09-0502:04:24
CWE-94
Wordfence
github.com
2
wordpress
remote code execution
vulnerability
file manager

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the ‘checkSyntax’ function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:*"
    ],
    "vendor": "bitapps",
    "product": "file_manager",
    "versions": [
      {
        "status": "affected",
        "version": "6.0",
        "versionType": "semver",
        "lessThanOrEqual": "6.5.5"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-7627