一、 漏洞 CVE-2024-13741 基础信息
漏洞标题
ProfileGrid – 用户配置文件、组和社区 <= 5.9.4.2 - 经认证 (用户+) 限制的服务器端请求伪造漏洞
来源:AIGC 神龙大模型
漏洞描述信息
WordPress插件ProfileGrid – User Profiles, Groups and Communities在所有版本中(包括5.9.4.2版本)存在Limited Server-Side Request Forgery漏洞,该漏洞通过pm_upload_image函数触发。这使得具有订阅者级别(或以上)权限的认证攻击者能够从web应用发起对任意位置的web请求,可以用来下载和查看图片,同时也可以用来验证本地或远程主机上是否存在非图片文件。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
来源:AIGC 神龙大模型
漏洞类别
服务端请求伪造(SSRF)
来源:AIGC 神龙大模型
漏洞标题
ProfileGrid – User Profiles, Groups and Communities <= 5.9.4.2 - Authenticated (Subscriber+) Limited Server-Side Request Forgery
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Limited Server-Side Request Forgery in all versions up to, and including, 5.9.4.2 via the pm_upload_image function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to download and view images, as well as validating if a non-image file exists, both on local or remote hosts.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
来源:美国国家漏洞数据库 NVD
漏洞类别
服务端请求伪造(SSRF)
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2024-13741 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2024-13741 的情报信息
  • 标题: ProfileGrid – User Profiles, Groups and Communities <= 5.9.4.2 - Authenticated (Subscriber+) Limited Server-Side Request Forgery -- 🔗来源链接

    标签:

  • 标题: crop.php in profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/public/partials – WordPress Plugin Repository -- 🔗来源链接

    标签:

  • 标题: class-profile-magic-public.php in profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/public – WordPress Plugin Repository -- 🔗来源链接

    标签:

  • https://nvd.nist.gov/vuln/detail/CVE-2024-13741