# WP Time Capsule 1.22.21及以下版本中的未经认证的任意文件上传漏洞
## 漏洞概述
WordPress插件Backup and Staging by WP Time Capsule中存在任意文件上传漏洞,主要是因为UploadHandler.php文件中缺少文件类型验证,并且没有防止直接文件访问,这使得未授权的攻击者可以在受影响的服务器上上传任意文件,从而可能导致远程代码执行。
## 影响版本
所有版本,包括1.22.21及之前的版本。
## 细节
该漏洞存在于UploadHandler.php文件中,其未能对上传文件类型进行有效验证,并且没有采取措施防止直接访问上传的文件。这些缺陷结合起来,允许攻击者上传任意文件。
## 影响
未授权的攻击者可以利用此漏洞上传任意文件到目标服务器上,这可能导致远程代码执行。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | WordPress WP Time Capsule Plugin Arbitrary File Upload Vulnerability | https://github.com/ubaii/CVE-2024-8856 | POC详情 |
2 | This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly. | https://github.com/Jenderal92/CVE-2024-8856 | POC详情 |
3 | WordPress WP Time Capsule Plugin Arbitrary File Upload Vulnerability | https://github.com/ubaydev/CVE-2024-8856 | POC详情 |
4 | The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-8856.yaml | POC详情 |
标题: Backup and Staging by WP Time Capsule <= 1.22.21 - Unauthenticated Arbitrary File Upload -- 🔗来源链接
标签:
神龙速读标题: UploadHandler.php in wp-time-capsule/trunk/wp-tcapsule-bridge/upload/php – WordPress Plugin Repository -- 🔗来源链接
标签:
标题: Changeset 3153289 for wp-time-capsule – WordPress Plugin Repository -- 🔗来源链接
标签:
暂无评论