Vulnerabilites related to ninjateam - File Manager Pro – Filester
cve-2024-12331
Vulnerability from cvelistv5
Published
2024-12-19 11:14
Modified
2024-12-20 17:41
Severity ?
EPSS score ?
Summary
The File Manager Pro – Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_install_plugin' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the Filebird plugin.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ninjateam | File Manager Pro – Filester |
Version: * ≤ 1.8.6 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12331", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-20T16:45:08.462676Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-20T17:41:11.368Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "File Manager Pro \u2013 Filester", "vendor": "ninjateam", "versions": [ { "lessThanOrEqual": "1.8.6", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Tr\u01b0\u01a1ng H\u1eefu Ph\u00fac (truonghuuphuc)" } ], "descriptions": [ { "lang": "en", "value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the \u0027ajax_install_plugin\u0027 function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the Filebird plugin." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-19T11:14:14.862Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b09bfff-4d6e-4de0-b6ab-6ac27c4f2be6?source=cve" }, { "url": "https://plugins.trac.wordpress.org/changeset/3208858/filester" } ], "timeline": [ { "lang": "en", "time": "2024-12-06T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2024-12-18T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "File Manager Pro \u2013 Filester \u003c= 1.8.6 - Missing Authorization to Authenticated (Subscriber+) Filebird Plugin Installation" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-12331", "datePublished": "2024-12-19T11:14:14.862Z", "dateReserved": "2024-12-06T22:02:01.509Z", "dateUpdated": "2024-12-20T17:41:11.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8066
Vulnerability from cvelistv5
Published
2024-11-28 08:47
Modified
2025-01-06 17:45
Severity ?
EPSS score ?
Summary
The File Manager Pro – Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the 'fsConnector' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ninjateam | File Manager Pro – Filester |
Version: * ≤ 1.8.6 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ninjateam:filemanager_pro-filester:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "filemanager_pro-filester", "vendor": "ninjateam", "versions": [ { "lessThanOrEqual": "1.8.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-8066", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T15:27:53.288415Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-06T17:45:20.183Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "File Manager Pro \u2013 Filester", "vendor": "ninjateam", "versions": [ { "lessThanOrEqual": "1.8.6", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "TANG Cheuk Hei" } ], "descriptions": [ { "lang": "en", "value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the \u0027fsConnector\u0027 function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site\u0027s server which may make remote code execution possible." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-04T01:01:54.035Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27288836-e5d3-49fc-b1f6-319ea3b70839?source=cve" }, { "url": "https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/FileManager.php#L269" }, { "url": "https://plugins.trac.wordpress.org/changeset/3186518/" } ], "timeline": [ { "lang": "en", "time": "2024-11-27T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "File Manager Pro \u2013 Filester \u003c= 1.8.6- Authenticated (Subscriber+) Arbitrary File Upload" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-8066", "datePublished": "2024-11-28T08:47:31.273Z", "dateReserved": "2024-08-21T22:44:39.513Z", "dateUpdated": "2025-01-06T17:45:20.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7031
Vulnerability from cvelistv5
Published
2024-08-03 08:36
Modified
2024-08-09 18:41
Severity ?
EPSS score ?
Summary
The File Manager Pro – Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'njt_fs_saveSettingRestrictions' function in all versions up to, and including, 1.8.2. This makes it possible for authenticated attackers, with a role that has been granted permissions by an Administrator, to update the plugin settings for user role restrictions, including allowing file types such as .php to be uploaded.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ninjateam | File Manager Pro – Filester |
Version: * ≤ 1.8.2 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ninjateam:filester:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "filester", "vendor": "ninjateam", "versions": [ { "lessThanOrEqual": "1.8.2", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7031", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-07T16:12:12.975255Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-07T16:13:13.550Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-09T18:41:01.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "technical-description" ], "url": "https://nowotarski.info/wordpress-nonce-authorization/" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "File Manager Pro \u2013 Filester", "vendor": "ninjateam", "versions": [ { "lessThanOrEqual": "1.8.2", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Bartek Nowotarski" } ], "descriptions": [ { "lang": "en", "value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the \u0027njt_fs_saveSettingRestrictions\u0027 function in all versions up to, and including, 1.8.2. This makes it possible for authenticated attackers, with a role that has been granted permissions by an Administrator, to update the plugin settings for user role restrictions, including allowing file types such as .php to be uploaded." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-03T08:36:57.626Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aef584bd-60a5-4bf2-b8d3-58e3b45e785e?source=cve" }, { "url": "https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/FileManager.php#L566" }, { "url": "https://plugins.trac.wordpress.org/changeset/3129722/" } ], "timeline": [ { "lang": "en", "time": "2024-08-02T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "File Manager Pro \u2013 Filester \u003c= 1.8.2 - Authenticated Plugin Settings Update" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-7031", "datePublished": "2024-08-03T08:36:57.626Z", "dateReserved": "2024-07-23T16:47:47.590Z", "dateUpdated": "2024-08-09T18:41:01.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9669
Vulnerability from cvelistv5
Published
2024-11-28 08:47
Modified
2024-11-29 19:24
Severity ?
EPSS score ?
Summary
The File Manager Pro – Filester plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 1.8.5 via the 'fm_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The vulnerability was partially patched in version 1.8.5.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ninjateam | File Manager Pro – Filester |
Version: * ≤ 1.8.5 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ninjateam:filemanager_pro-filester:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "filemanager_pro-filester", "vendor": "ninjateam", "versions": [ { "lessThanOrEqual": "1.8.5", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9669", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T19:23:29.595266Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T19:24:13.054Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "File Manager Pro \u2013 Filester", "vendor": "ninjateam", "versions": [ { "lessThanOrEqual": "1.8.5", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "TANG Cheuk Hei" } ], "descriptions": [ { "lang": "en", "value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 1.8.5 via the \u0027fm_locale\u0027 parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. The vulnerability was partially patched in version 1.8.5." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-28T08:47:32.349Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d947023-60d3-4bd8-b45d-e1663326d6c1?source=cve" }, { "url": "https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/FileManager.php#L250" }, { "url": "https://plugins.trac.wordpress.org/browser/filester/trunk/views/pages/html-filemanager.php#L3" }, { "url": "https://plugins.trac.wordpress.org/changeset/3186518/" }, { "url": "https://plugins.trac.wordpress.org/changeset/3196150/" } ], "timeline": [ { "lang": "en", "time": "2024-11-27T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "File Manager Pro \u2013 Filester \u003c= 1.8.5 - Authenticated (Administrator+) Local JavaScript File Inclusion" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-9669", "datePublished": "2024-11-28T08:47:32.349Z", "dateReserved": "2024-10-08T23:09:38.969Z", "dateUpdated": "2024-11-29T19:24:13.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }