Sploit.io - Search

Product: Z-Downloads, version: >= n/a, <= 1.11.3

CVE-2024-34555

Severity: CRITICAL

Description: Unrestricted Upload of File with Dangerous Type vulnerability in URBAN BASE Z-Downloads.This issue affects Z-Downloads: from n/a through 1.11.3.

CVSS Score: 9.1

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.111330000
  • Date: 2025-01-10

ExploitDB

No data available.

HackerOne Data

  • Rank: 7450
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • URBAN BASE Z-Downloads - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-34555 is an Unrestricted Upload of File with Dangerous Type issue in the URBAN BASE Z-Downloads plugin for WordPress. This flaw allows authenticated attackers with high privileges to upload arbitrary files, including malicious scripts, to the server. The CVSS v3.1 base score of 9.1 (CRITICAL) underscores the severity of this vulnerability. The attack vector is network-based, requiring high privileges but no user interaction, making it relatively easy to exploit for attackers with access to an administrative account.

    The potential business impact is significant. If exploited, this vulnerability could lead to a complete compromise of the affected system. Attackers could upload malicious files, such as web shells, to gain persistent access, exfiltrate sensitive data, or disrupt services. The confidentiality, integrity, and availability of the system are all at high risk. The scope of the vulnerability is changed, meaning exploitation could affect other components beyond the vulnerable plugin.

    The likelihood of exploitation is moderate to high, given the critical nature of the vulnerability and the prevalence of WordPress plugins in web environments. However, the requirement for high privileges reduces the attack surface to authenticated users with administrative access.

    2. Potential Attack Scenarios
    One potential attack scenario involves an attacker who has gained access to an administrative account on a WordPress site using the Z-Downloads plugin. The attacker could exploit this vulnerability by uploading a malicious PHP file disguised as a legitimate file, such as an image or document. Once uploaded, the attacker could execute the file by navigating to its location on the server. This could result in the execution of arbitrary code, allowing the attacker to take full control of the server.

    For example, the attacker could upload a web shell, enabling them to execute commands, modify files, or exfiltrate data. The attacker could also use the compromised server as a launchpad for further attacks, such as spreading malware or conducting phishing campaigns. The potential outcomes include data breaches, service disruption, and reputational damage for the affected organization.

    3. Mitigation Recommendations
    The primary mitigation for this vulnerability is to update the Z-Downloads plugin to version 1.11.4 or later, as this version addresses the issue. Organizations using the plugin should immediately check their installations and apply the update if they are running version 1.11.3 or earlier.

    Additionally, organizations should review and restrict administrative access to their WordPress installations. Implementing the principle of least privilege can reduce the risk of exploitation by limiting the number of users with high privileges. Regular security audits and monitoring of file uploads can also help detect and prevent unauthorized activities.

    For further guidance, refer to the Patchstack advisory at: https://patchstack.com/database/vulnerability/z-downloads/wordpress-z-downloads-plugin-1-11-3-arbitrary-file-upload-vulnerability?_s_id=cve

    4. Executive Summary
    CVE-2024-34555 is a critical vulnerability in the URBAN BASE Z-Downloads plugin for WordPress, allowing authenticated attackers with high privileges to upload malicious files and potentially take full control of the affected system. This poses significant risks to data confidentiality, system integrity, and service availability.

    Exploitation of this vulnerability could lead to severe consequences, including data breaches, service disruption, and reputational damage. While the attack requires high privileges, the ease of exploitation and the critical nature of the vulnerability make it a high-priority issue.

    To mitigate this risk, organizations should immediately update the Z-Downloads plugin to version 1.11.4 or later and restrict administrative access to their WordPress installations. Taking these steps is essential to protect sensitive data, maintain business continuity, and safeguard the organization’s reputation. Addressing this vulnerability promptly is critical to minimizing potential impacts and ensuring the security of your web environment.