CVE-2024-3136 Scanner

CVE-2024-3136 scanner - Local File Inclusion (LFI) vulnerability in MasterStudy LMS plugin for WordPress

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 month 2 days

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

MasterStudy LMS is a popular learning management system plugin for WordPress, utilized by educators and institutions to create and manage online courses. It provides various tools for creating interactive lessons, quizzes, and multimedia content. Administrators and instructors use it to facilitate learning, track student progress, and enhance the educational experience. The software integrates seamlessly with WordPress, making it a flexible and widely adopted solution. Its user-friendly interface and robust features support a wide range of e-learning scenarios.

The Local File Inclusion (LFI) vulnerability in MasterStudy LMS plugin up to version 3.3.3 allows unauthenticated attackers to include and execute arbitrary files on the server. This vulnerability exists due to improper handling of the 'template' parameter. Exploiting this flaw can lead to unauthorized file access, data leakage, and potential code execution. The critical nature of this issue necessitates immediate attention and remediation.

The MasterStudy LMS plugin's 'template' parameter is vulnerable to Local File Inclusion (LFI) attacks. An attacker can exploit this by manipulating the 'template' parameter in HTTP requests, allowing the inclusion of arbitrary files from the server's file system. This can bypass access controls and execute PHP code from included files. The vulnerability affects all versions up to and including 3.3.3. The endpoint '/wp-admin/admin-ajax.php' and the parameter 'template' are specifically targeted in this attack vector.

Exploiting this vulnerability can lead to severe consequences, including unauthorized access to sensitive files, execution of arbitrary code on the server, and privilege escalation. Attackers can potentially gain control over the affected system, steal confidential data, and disrupt services. The ability to execute arbitrary PHP code can further be leveraged to install backdoors, exfiltrate data, and compromise the entire WordPress installation.

By using the S4E platform, you gain comprehensive protection for your digital assets. Our platform continuously scans for vulnerabilities, ensuring your systems remain secure against the latest threats. Detailed reports and actionable insights help you understand and mitigate risks effectively. Joining our platform provides you with the tools and support needed to maintain robust cybersecurity defenses. Secure your digital landscape today with S4E's expert solutions.

References:

Get started to protecting your Free Full Security Scan