CVE-2024-10957 Vulnerability in UpdraftPlus Plugin

Description

The vulnerability lies in the recursive_unserialized_replace function of the UpdraftPlus plugin. Improper handling of deserialization allows attackers to inject a PHP object if additional plugins or themes containing a Property-Oriented Programming (POP) chain are installed. While no POP chain exists within UpdraftPlus itself, the exploitability depends on the presence of other vulnerable components.

Key Details:

  1. CVE Identifier: CVE-2024-10957
  2. Affected Versions: UpdraftPlus versions 1.23.8 to 1.24.11.
  3. Severity: High (CVSS score: 8.8).
  4. Conditions for Exploitation:
    • An administrator must perform a search-and-replace action in the plugin.
    • A vulnerable POP chain must be present in another installed plugin or theme.

Campaign Scenario

Initial Exploitation
  1. Malicious Input Injection:
    • An attacker injects malicious data into the WordPress site, targeting the deserialization function of the plugin.
  2. Triggering the Exploit:
    • The payload is triggered when an administrator executes a search-and-replace operation using UpdraftPlus.

Impact
  • Delete Arbitrary Files: Critical website files may be erased, leading to functionality disruptions or downtime.
  • Access Sensitive Data: Confidential information, such as database credentials or user data, could be exposed.
  • Execute Arbitrary Code: The attacker gains control over the website, potentially using it for further attacks or malware distribution.

Affected Product or Versions

Vulnerable Versions
  • UpdraftPlus Backup & Migration Plugin:
    • Versions 1.23.8 through 1.24.11.

Patched Version
  • Version 1.24.12 resolves this vulnerability.

Recommendations

  1. Update the Plugin:
    • All users must update to UpdraftPlus version 1.24.12 or later to mitigate this vulnerability.
    • Updates can be performed through the WordPress admin dashboard under Plugins > Installed Plugins or downloaded from the official WordPress repository.
  1. Audit Installed Plugins and Themes:
    • Check for other plugins or themes containing POP chains, which could make the site susceptible to exploitation.
    • Remove or update vulnerable components immediately.
  2. Restrict Access to Administrative Actions:
    • Limit the ability to perform search-and-replace operations to trusted administrators only.
  3. Enhance Monitoring:
    • Use security plugins to monitor suspicious activity and prevent malicious payloads from being injected.
  4. Backup Data Regularly:
    • Ensure regular backups are in place to restore data in case of exploitation.

Protect your website from vulnerabilities like CVE-2024-10957 with Protergo’s advanced security solutions. Our expert team ensures your site stays secure, minimizing risks to your data and functionality. Learn more about our services here.

References

Scroll to Top