
CVE-2024-10708 Scanner
CVE-2024-10708 - Detects 'Local File Inclusion (LFI)' vulnerability in System Dashboard affects v. < 2.8.15.
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
20 days 3 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
The System Dashboard plugin is widely used to manage and display system metrics for various web applications. It is typically employed by administrators who want to keep track of system performance and resource usage. The plugin is popular for its ease of use and robust functionalities, allowing it to seamlessly integrate with existing systems. Given its utility, it is often installed on WordPress platforms where monitoring and maintenance are crucial. System Dashboard helps users to visualize data effectively, making it a valuable tool for proactive system management.
The Local File Inclusion (LFI) vulnerability allows attackers to include files on a server through a web browser. In this specific case, the vulnerability is found in the System Dashboard plugin, allowing a user with admin credentials to access sensitive files. Such vulnerabilities can expose system configurations and database credentials if exploited. The flaw is within the sd_viewer action, which does not properly sanitize the filename parameter. This oversight in the plugin's design opens the door for potentially serious security breaches.
The vulnerability is rooted in insufficient input validation, particularly the lack of sanitization on a parameter used within sd_viewer. With an attacker having admin privileges, they can input arbitrary paths to access system files. The vulnerable endpoint is the admin-ajax.php file, which processes requests without enforcing strict access controls or input restrictions. The vulnerability affects the filename parameter, which should be restricted to avoid accessing unintended files. Due to this, sensitive files like wp-config.php could be accessed, revealing database configurations.
Exploiting the Local File Inclusion vulnerability can lead to unauthorized file access, exposing sensitive information such as configuration files. If an attacker gains this information, they can escalate their attack by altering files or launching further attacks based on the leaked data. For websites, this can manifest as compromised user data, stolen credentials, or even server manipulation. Ultimately, this can result in significant reputational damage and data loss for organizations using the affected plugin.
REFERENCES