CVE-2020-24149

7.5 HIGH

📋 TL;DR

This CVE describes a server-side request forgery (SSRF) vulnerability in the Podcast Importer SecondLine WordPress plugin. Attackers can exploit this by sending specially crafted requests to make the vulnerable server perform unauthorized requests to internal or external systems. WordPress sites using version 1.1.4 of this plugin are affected.

💻 Affected Systems

Products:
  • Podcast Importer SecondLine WordPress plugin
Versions: 1.1.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. No special configuration needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through internal service enumeration, credential theft from metadata services, or remote code execution via chained attacks.

🟠

Likely Case

Information disclosure from internal services, port scanning of internal networks, or abuse of the server as a proxy for malicious activities.

🟢

If Mitigated

Limited impact if network segmentation restricts internal access and external requests are filtered.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending HTTP POST requests to the vulnerable endpoint with malicious podcast_feed parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.5 and later

Vendor Advisory: https://wordpress.org/plugins/podcast-importer-secondline/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Podcast Importer SecondLine'. 4. Click 'Update Now' if available, or manually update to version 1.1.5+. 5. Verify plugin version after update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Podcast Importer SecondLine plugin until patched.

wp plugin deactivate podcast-importer-secondline

Web Application Firewall rule

all

Block requests to the vulnerable endpoint using WAF rules.

Block POST requests to */wp-admin/admin.php?page=secondlinepodcastimport* with action=secondline_import_initialize

🧯 If You Can't Patch

  • Implement strict network egress filtering to limit outbound connections from web servers
  • Deploy web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress plugin version: Navigate to Plugins → Installed Plugins and verify Podcast Importer SecondLine version is 1.1.4.

Check Version:

wp plugin get podcast-importer-secondline --field=version

Verify Fix Applied:

Confirm plugin version is 1.1.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-admin/admin.php?page=secondlinepodcastimport with podcast_feed parameter containing unusual URLs
  • Outbound connections from web server to internal IP ranges or unusual domains

Network Indicators:

  • Web server making unexpected outbound HTTP requests to internal services or unusual external domains

SIEM Query:

source="web_server_logs" AND (uri_path="/wp-admin/admin.php" AND query_string="page=secondlinepodcastimport" AND method="POST")

🔗 References

📤 Share & Export