Skip to content

Unauthenticated Full Path Dislcosure <= 1.2.16 #263

@h1dd3nsn1p3r

Description

@h1dd3nsn1p3r

👉 Describe the issue:

CVE ID: CVE-2024-6560
CVSS Severity Score: 5.3 (Medium)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Organization: Wordfence
Vulnerability Researcher(s): stealthcopter
Software Link(s): https://wordpress.org/plugins/addonify-quick-view

The Addonify – Quick View For WooCommerce plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.2.16. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damaged to an affected website.

👉 How can we reproduce this Bug?

  1. Install the addonify-quick-view plugin
  2. Navigate to the following URL:
/wp-content/plugins/addonify-quick-view/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php
  1. Observe the leaking of the server's path in an error message:
  2. Done. Check file.
/var/www/html/wp-content/plugins/addonify-quick-view/vendor/mobiledetect/mobiledetectlib/MobileDetect.json

👉 Solution:

We would recommend that you prevent direct access to the /export/exportToJSON.php file.

👉 Reporter:

Security team at WordFence

Metadata

Metadata

Labels

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions