The Download Manager plugin for WordPress is commonly used to manage and secure downloadable files, including documents, images, and other resources. It allows administrators to set up password-protected downloads to restrict access to certain files. However, a critical vulnerability, CVE-2024-13126, has been discovered that allows unauthenticated users to bypass password protection and download all files from the plugin’s directory, including those that are meant to be password-protected. This vulnerability, stemming from improper directory listing configurations, exposes the protected content to unauthorized users. With over 100,000 active installations, this issue poses a significant security risk to WordPress websites using the Download Manager plugin.

CVECVE-2024-13126
PluginDownload Manager < 3.3.07
CriticalHigh
All Time9 305 211
Active installations100 000+
Publicly PublishedJanuary 17, 2025
Last UpdatedJanuary 17, 2025
ResearcherDmitrii Ignatyev
OWASP TOP-10A7: Cross-Site Scripting (XSS)
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13126/
https://wpscan.com/vulnerability/c2c69a44-4ecc-41d1-a10c-cfe9c875b803/
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

December 19, 2024Plugin testing and vulnerability detection in the Download Manager have been completed
December 19, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
January 17, 2025Registered CVE-2024-13126

Discovery of the Vulnerability

The vulnerability was discovered during a security audit of the Download Manager plugin. The issue arises from the plugin’s failure to properly secure the directory where the files are stored. When users upload files through the plugin, they are stored in the /wp-content/uploads/download-manager-files/ directory. However, due to improper directory listing configurations, unauthenticated users can access this directory directly. As a result, attackers can bypass any password protection set on the files and download them freely. This vulnerability occurs because the plugin does not prevent unauthenticated users from viewing the contents of the directory, which would otherwise be restricted.

Understanding of XSS attack’s

An unauthenticated password bypass vulnerability occurs when an attacker is able to bypass authentication or access controls without the need for valid credentials. In the case of this vulnerability, the issue lies in the directory listing, where an attacker can enumerate files in a restricted directory without needing a password. Directory listing vulnerabilities occur when a server is configured to reveal the contents of a directory when an invalid or incomplete URL is requested. A real-world example of this kind of vulnerability occurred in earlier versions of the WP File Manager plugin, where unauthorized users could access sensitive files via directory listing. Similarly, CVE-2024-13126 in the Download Manager plugin allows attackers to access and download password-protected files without the required credentials.

Exploiting the XSS Vulnerability

To exploit CVE-2024-13126, an attacker with None privileges:

POC:

1) http://127.0.0.1/wordpress/wp-content/uploads/download-manager-files/

____

The risks associated with CVE-2024-13126 are significant, particularly for websites that use the Download Manager plugin to protect sensitive or confidential files. If an attacker can access the directory listing and download protected files, they can steal sensitive data, intellectual property, or confidential business documents. In a real-world scenario, this vulnerability could be exploited by competitors to obtain proprietary content or by malicious actors to steal personal information from users. The exposure of password-protected files could also lead to compliance violations if personal data or financial information is involved. Additionally, since this vulnerability does not require authentication, any user who knows the directory path can exploit it, making it easier for attackers to gain access to sensitive content.

Recommendations for Improved Security

To mitigate the risks associated with CVE-2024-13126, it is essential for administrators to take immediate action. The first step is to update the Download Manager plugin to the latest version once a patch is released. In addition to updating the plugin, administrators should ensure that directory listings are disabled on the server to prevent unauthorized users from viewing the contents of the /wp-content/uploads/download-manager-files/ directory. This can typically be done by configuring the server’s .htaccess file or other server-side security settings. Additionally, using proper access controls to restrict access to uploaded files is crucial. Administrators should also periodically review the permissions for uploaded files and ensure that password-protected files are properly secured against unauthorized access.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-13126, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #DirectoryListing #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2024-13126 – Download Manager – Unauth Password Bypass via Directory Listing – POC

Leave a Reply

Your email address will not be published. Required fields are marked *