Exploit
CVE-2024-7863

Cross-Site Request Forgery (CSRF) (CWE-352)

Published: Sep 13, 2024 / Updated: 2mo ago

010
CVSS 6.8EPSS 0.04%Medium
CVE info copied to clipboard

Summary

The Favicon Generator (CLOSED) WordPress plugin before version 2.1 contains two critical security vulnerabilities: 1. Lack of file validation for uploads 2. Absence of CSRF (Cross-Site Request Forgery) checks These vulnerabilities affect the plugin's file upload functionality, potentially allowing malicious actors to upload arbitrary files, including PHP files, to the server. This issue affects versions of the plugin prior to 2.1.

Impact

The impact of this vulnerability is severe: 1. Arbitrary File Upload: Attackers can exploit the lack of file validation to upload malicious files, such as PHP scripts, directly to the server. 2. Remote Code Execution: Successfully uploaded PHP files could be executed on the server, potentially leading to complete server compromise. 3. Unauthorized Actions: The absence of CSRF protection means attackers could trick authenticated administrators into performing unintended actions, such as uploading malicious files without their knowledge. 4. Data Breach: Compromised servers could lead to unauthorized access to sensitive information, including user data and database contents. 5. Website Defacement: Attackers could manipulate or replace legitimate website content. 6. Malware Distribution: The compromised server could be used to host and distribute malware to site visitors. Given that this plugin is related to favicon generation, a core visual element of websites, the potential for widespread exploitation across multiple WordPress sites is significant.

Exploitation

One proof-of-concept exploit is available on wpscan.com. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been addressed in version 2.1 of the Favicon Generator (CLOSED) WordPress plugin. Users should immediately update to this version or later to mitigate the risk.

Mitigation

To mitigate this vulnerability, the following actions are recommended: 1. Immediate Update: Update the Favicon Generator (CLOSED) WordPress plugin to version 2.1 or later as soon as possible. 2. Plugin Removal: If immediate updating is not possible, consider temporarily disabling or removing the plugin until it can be updated. 3. File Integrity Check: Conduct a thorough review of all files on the server, especially those in the WordPress uploads directory, to identify any potentially malicious files that may have been uploaded. 4. Access Logs Review: Analyze server access logs for any suspicious activities or unexpected file uploads. 5. WordPress Core Update: Ensure that WordPress core and all other plugins are up-to-date to minimize overall attack surface. 6. Implement Web Application Firewall (WAF): Consider using a WAF to provide an additional layer of protection against file upload vulnerabilities and CSRF attacks. 7. Principle of Least Privilege: Review and restrict administrative access to only necessary personnel. 8. Regular Security Audits: Implement a routine security audit process to identify and address vulnerabilities promptly. Given the high severity of this vulnerability, it is crucial to prioritize these mitigation efforts, especially for sites running versions of the Favicon Generator (CLOSED) plugin prior to 2.1.

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2024-7863. See article

Aug 29, 2024 at 1:48 PM / Wordfence
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 13, 2024 at 6:10 AM
CVE Assignment

NVD published the first details for CVE-2024-7863

Sep 13, 2024 at 6:15 AM
CVSS

A CVSS base score of 8.1 has been assigned.

Sep 13, 2024 at 3:40 PM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.6%)

Sep 14, 2024 at 6:24 PM
CVSS

A CVSS base score of 6.8 has been assigned.

Sep 27, 2024 at 9:30 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Sep 27, 2024 at 11:11 PM
Static CVE Timeline Graph

Affected Systems

Pixeljar/favicon_generator
+null more

Exploits

https://wpscan.com/vulnerability/5e814b02-3870-4742-905d-ec03b0d31add/
+null more

Attack Patterns

CAPEC-111: JSON Hijacking (aka JavaScript Hijacking)
+null more

News

CVE-2024-7863 Exploit
CVE Id : CVE-2024-7863 Published Date: 2024-09-27T21:27:00+00:00 The Favicon Generator (CLOSED) WordPress plugin before 2.1 does not validate files to be uploaded and does not have CSRF checks, which could allow attackers to make logged in admin upload arbitrary files such as PHP on the server inTheWild added a link to an exploit: https://wpscan.com/vulnerability/5e814b02-3870-4742-905d-ec03b0d31add/
Update Wed Sep 25 14:35:02 UTC 2024
Update Wed Sep 25 14:35:02 UTC 2024
Security Bulletin 18 Sep 2024 - Cyber Security Agency of Singapore
https:// nvd . nist .gov/vuln/detail/ CVE -2024-45798. CVE -2024-45496, A flaw was found in OpenShift. This issue occurs due to the misuse of elevated ...
NA - CVE-2024-7863 - The Favicon Generator (CLOSED) WordPress plugin...
The Favicon Generator (CLOSED) WordPress plugin before 2.1 does not validate files to be uploaded and does not have CSRF checks, which could allow attackers to make logged in admin upload arbitrary...
CVE-2024-7863 - The Favicon Generator (CLOSED) WordPress plugin be
CVE ID : CVE-2024-7863 Published : Sept. 13, 2024, 6:15 a.m. 19 minutes ago Description : The Favicon Generator (CLOSED) WordPress plugin before 2.1 does not validate files to be uploaded and does not have CSRF checks, which could allow attackers to make logged in admin upload arbitrary files such as PHP on the server Severity: 0.0 NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...
See 5 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:High
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI