# WordPress File Upload <= 4.24.11 - wfu_file_downloader.php 中无需身份验证的路径遍历导致任意文件读取和删除
## 漏洞概述
WordPress File Upload插件存在路径遍历漏洞,允许未认证的攻击者读取或删除超出预期目录的文件。
## 影响版本
所有版本,包括4.24.11及以下版本。
## 漏洞细节
在`wfu_file_downloader.php`文件中存在路径遍历漏洞,影响版本为4.24.11及以下版本。成功利用该漏洞需要目标WordPress安装使用PHP 7.4或更早版本。
## 影响
允许未认证的攻击者读取或删除超出预期目录的文件。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | WordPress File Upload插件任意文件读取漏洞(CVE-2024-9047)批量检测脚本 | https://github.com/iSee857/CVE-2024-9047-PoC | POC详情 |
2 | POC - WordPress File Upload plugin, in the wfu_file_downloader.php file before version <= 4.24.11 | https://github.com/verylazytech/CVE-2024-9047 | POC详情 |
3 | Exploit for WordPress File Upload Plugin - All versions up to 4.24.11 are vulnerable. | https://github.com/Nxploited/CVE-2024-9047-Exploit | POC详情 |
4 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/chihyeonwon/CVE-2024-9047 | POC详情 |
5 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/mr-won/CVE-2024-9047 | POC详情 |
6 | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9047.yaml | POC详情 |
7 | CVE-2024-9047, wfu_file_downloader.php | https://github.com/user20252228/CVE-2024-9047 | POC详情 |
标题: WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php -- 🔗来源链接
标签:
神龙速读标题: Changeset 3164449 for wp-file-upload – WordPress Plugin Repository -- 🔗来源链接
标签: