CVE-2024-54385 Scanner

CVE-2024-54385 Scanner - Server-Side Request Forgery vulnerability in Radio Player

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

15 days

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

The Radio Player plugin for WordPress is widely used to integrate live audio streams such as Shoutcast and Icecast into websites. It is designed for web administrators and developers aiming to deliver a seamless audio experience to users. With features like customizable players and broad compatibility, this plugin simplifies the process of embedding live streams on WordPress sites.

The vulnerability detected is a Server-Side Request Forgery (SSRF). This flaw allows attackers to manipulate the web server to make unauthorized requests to arbitrary locations. Exploiting this vulnerability can lead to querying and modifying sensitive data from internal services.

The technical details of this vulnerability involve a vulnerable endpoint that processes unauthenticated requests. The "radio_player_get_stream_data" action parameter, combined with a crafted URL, enables attackers to trigger unauthorized requests via server-side communication. The affected parameters include nonce and url fields in HTTP POST requests.

Exploitation of this vulnerability can lead to sensitive data leakage, manipulation of internal services, and potential pivoting into more critical systems. Malicious users could misuse it for reconnaissance or privilege escalation.

REFERENCES

Get started to protecting your Free Full Security Scan