CVE-2024-3242

The Brizy – Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file extension validation in the validateImageContent function called via storeImages in all versions up to, and including, 2.4.43. This makes it possible for authenticated attackers, with contributor access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Version 2.4.44 prevents the upload of files ending in .sh and .php. Version 2.4.45 fully patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:brizy:brizy-page_builder:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 09:29

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L264 - Patch () https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L264 - Patch
References () https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L547 - Patch () https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L547 - Patch
References () https://plugins.trac.wordpress.org/changeset/3086506/brizy/trunk/editor/zip/archiver.php - Patch () https://plugins.trac.wordpress.org/changeset/3086506/brizy/trunk/editor/zip/archiver.php - Patch
References () https://plugins.trac.wordpress.org/changeset/3112878/brizy/trunk?contextall=1&old=3086506&old_path=%2Fbrizy%2Ftrunk - Patch () https://plugins.trac.wordpress.org/changeset/3112878/brizy/trunk?contextall=1&old=3086506&old_path=%2Fbrizy%2Ftrunk - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/a414de0a-ae44-4955-bd25-ec6ad7860835?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/a414de0a-ae44-4955-bd25-ec6ad7860835?source=cve - Third Party Advisory

19 Jul 2024, 16:24

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L264 - () https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L264 - Patch
References () https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L547 - () https://plugins.trac.wordpress.org/browser/brizy/trunk/editor/zip/archiver.php#L547 - Patch
References () https://plugins.trac.wordpress.org/changeset/3086506/brizy/trunk/editor/zip/archiver.php - () https://plugins.trac.wordpress.org/changeset/3086506/brizy/trunk/editor/zip/archiver.php - Patch
References () https://plugins.trac.wordpress.org/changeset/3112878/brizy/trunk?contextall=1&old=3086506&old_path=%2Fbrizy%2Ftrunk - () https://plugins.trac.wordpress.org/changeset/3112878/brizy/trunk?contextall=1&old=3086506&old_path=%2Fbrizy%2Ftrunk - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/a414de0a-ae44-4955-bd25-ec6ad7860835?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/a414de0a-ae44-4955-bd25-ec6ad7860835?source=cve - Third Party Advisory
CWE CWE-434
CPE cpe:2.3:a:brizy:brizy-page_builder:*:*:*:*:*:wordpress:*:*
Summary
  • (es) El complemento Brizy – Page Builder para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validación de la extensión del archivo en la función validarImageContent llamada a través de storeImages en todas las versiones hasta la 2.4.43 incluida. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código. La versión 2.4.44 impide la carga de archivos que terminen en .sh y .php. La versión 2.4.45 soluciona completamente el problema.
First Time Brizy
Brizy brizy-page Builder

18 Jul 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-18 09:15

Updated : 2024-11-21 09:29


NVD link : CVE-2024-3242

Mitre link : CVE-2024-3242

CVE.ORG link : CVE-2024-3242


JSON object : View

Products Affected

brizy

  • brizy-page_builder
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type