CVE-2024-3934

The Mercado Pago payments for WooCommerce plugin for WordPress is vulnerable to Path Traversal in versions 7.3.0 to 7.5.1 via the mercadopagoDownloadLog function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information. The arbitrary file download was patched in 7.5.1, while the missing authorization was corrected in version 7.6.2.
Configurations

No configuration.

History

21 Nov 2024, 09:30

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/woocommerce-mercadopago/trunk/src/Admin/Settings.php#L663 - () https://plugins.trac.wordpress.org/browser/woocommerce-mercadopago/trunk/src/Admin/Settings.php#L663 -
References () https://plugins.trac.wordpress.org/changeset/3098023/woocommerce-mercadopago/trunk/src/IO/Downloader.php?old=3078706&old_path=woocommerce-mercadopago%2Ftrunk%2Fsrc%2FIO%2FDownloader.php - () https://plugins.trac.wordpress.org/changeset/3098023/woocommerce-mercadopago/trunk/src/IO/Downloader.php?old=3078706&old_path=woocommerce-mercadopago%2Ftrunk%2Fsrc%2FIO%2FDownloader.php -
References () https://plugins.trac.wordpress.org/changeset/3119214/woocommerce-mercadopago/tags/7.6.2/src/IO/Downloader.php?old=3108278&old_path=woocommerce-mercadopago%2Ftags%2F7.6.1%2Fsrc%2FIO%2FDownloader.php - () https://plugins.trac.wordpress.org/changeset/3119214/woocommerce-mercadopago/tags/7.6.2/src/IO/Downloader.php?old=3108278&old_path=woocommerce-mercadopago%2Ftags%2F7.6.1%2Fsrc%2FIO%2FDownloader.php -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/1674e81e-6a75-436c-b219-8ec0a484a134?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/1674e81e-6a75-436c-b219-8ec0a484a134?source=cve -

22 Jul 2024, 13:00

Type Values Removed Values Added
Summary
  • (es) El complemento Mercado Pago payments for WooCommerce para WordPress es vulnerable a Path Traversal en las versiones 7.3.0 a 7.5.1 a través de la función mercadopagoDownloadLog. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, descarguen y lean el contenido de archivos arbitrarios en el servidor, que pueden contener información confidencial. La descarga de archivos arbitrarios fue parcheada en la versión 7.5.1, mientras que la autorización faltante se corrigió en la versión 7.6.2.

20 Jul 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-20 04:15

Updated : 2024-11-21 09:30


NVD link : CVE-2024-3934

Mitre link : CVE-2024-3934

CVE.ORG link : CVE-2024-3934


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')