vendor:
Augmented-Reality Plugin
by:
Milad Karimi (Ex3ptionaL)
8.1
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: Augmented-Reality Plugin
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2023-XXXXX (Not real CVE, placeholder)
CPE: a:wordpress:augmented-reality
Metasploit:
https://www.rapid7.com/db/vulnerabilities/suse-cve-2024-1597/, https://www.rapid7.com/db/vulnerabilities/mediawiki-cve-2024-23174/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2022-43358/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-RHEL9-unaffected/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-23504/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-RHEL8-unaffected/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-14723/, https://www.rapid7.com/db/vulnerabilities/wordpress-cve-2017-14723/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/red_hat-jboss_eap-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/ibm-http_server-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-9788/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2017-9788/, https://www.rapid7.com/db/?q=placeholder)&type=&page=2, https://www.rapid7.com/db/?q=placeholder)&type=&page=2
Platforms Tested: Windows 10, Firefox
2023
WordPress Augmented-Reality Remote Code Execution Unauthenticated
The exploit allows remote attackers to execute arbitrary code without authentication in WordPress Augmented-Reality plugin. By exploiting this vulnerability, an attacker can upload malicious files and execute commands on the target system.
Mitigation:
To mitigate this vulnerability, it is recommended to update the WordPress Augmented-Reality plugin to the latest version and restrict access to the affected plugin directories.