CVE-2024-4354

The TablePress – Tables in WordPress made easy plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.3 via the get_files_to_import() function. This makes it possible for authenticated attackers, with author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Due to the complex nature of protecting against DNS rebind attacks in WordPress software, we settled on the developer simply restricting the usage of the URL import functionality to just administrators. While this is not optimal, we feel this poses a minimal risk to most site owners and ideally WordPress core would correct this issue in wp_safe_remote_get() and other functions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tablepress:tablepress:*:*:*:*:*:wordpress:*:*

History

18 Jul 2024, 16:14

Type Values Removed Values Added
CWE CWE-918
CPE cpe:2.3:a:tablepress:tablepress:*:*:*:*:*:wordpress:*:*
First Time Tablepress tablepress
Tablepress
References () https://plugins.trac.wordpress.org/browser/tablepress/trunk/classes/class-import.php#L125 - () https://plugins.trac.wordpress.org/browser/tablepress/trunk/classes/class-import.php#L125 - Patch
References () https://plugins.trac.wordpress.org/browser/tablepress/trunk/classes/class-import.php#L141 - () https://plugins.trac.wordpress.org/browser/tablepress/trunk/classes/class-import.php#L141 - Patch
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3097113%40tablepress&new=3097113%40tablepress&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3097113%40tablepress&new=3097113%40tablepress&sfp_email=&sfph_mail= - Patch
References () https://www.clear-gate.com/blog/ssrf-with-dns-rebinding-2/ - () https://www.clear-gate.com/blog/ssrf-with-dns-rebinding-2/ - Technical Description
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/879384eb-bfea-4667-a7de-9f723dbea74b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/879384eb-bfea-4667-a7de-9f723dbea74b?source=cve - Third Party Advisory

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) El complemento TablePress – Tables in WordPress made easy para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 2.3 incluida a través de la función get_files_to_import(). Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, realicen solicitudes web a ubicaciones arbitrarias que se originen en la aplicación web y puedan usarse para consultar y modificar información de servicios internos. Debido a la naturaleza compleja de la protección contra ataques de revinculación de DNS en el software WordPress, decidimos que el desarrollador simplemente restringiera el uso de la funcionalidad de importación de URL solo a los administradores. Si bien esto no es óptimo, creemos que representa un riesgo mínimo para la mayoría de los propietarios de sitios e idealmente el núcleo de WordPress corregiría este problema en wp_safe_remote_get() y otras funciones.

07 Jun 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-07 06:15

Updated : 2024-07-18 16:14


NVD link : CVE-2024-4354

Mitre link : CVE-2024-4354

CVE.ORG link : CVE-2024-4354


JSON object : View

Products Affected

tablepress

  • tablepress
CWE
CWE-918

Server-Side Request Forgery (SSRF)