CVE-2024-10816

7.5 HIGH

📋 TL;DR

The LUNA RADIO PLAYER WordPress plugin contains a directory traversal vulnerability in its js/fallback.php file that allows unauthenticated attackers to read arbitrary files on the server. This affects all WordPress sites using the plugin up to version 6.24.01.24. Attackers can potentially access sensitive configuration files, credentials, or other confidential data.

💻 Affected Systems

Products:
  • LUNA RADIO PLAYER WordPress Plugin
Versions: All versions up to and including 6.24.01.24
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain database credentials, admin passwords, or other sensitive system files leading to complete site compromise, data theft, or server takeover.

🟠

Likely Case

Attackers read wp-config.php to obtain database credentials, then use those to access/modify site data or install backdoors.

🟢

If Mitigated

If proper file permissions and web server restrictions are in place, attackers may only access publicly readable files with limited sensitive information.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation required. No authentication needed. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 6.24.01.24

Vendor Advisory: https://radioplayer.luna-universe.com/update

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find LUNA RADIO PLAYER and click 'Update Now'. 4. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable endpoint

all

Block access to the vulnerable js/fallback.php file via web server configuration

# For Apache: add to .htaccess
<Files "js/fallback.php">
    Order Allow,Deny
    Deny from all
</Files>
# For Nginx: add to server block
location ~* /js/fallback\.php$ {
    deny all;
    return 403;
}

Disable plugin

all

Temporarily deactivate the LUNA RADIO PLAYER plugin until patched

# Via WordPress admin: Plugins → Installed Plugins → Deactivate LUNA RADIO PLAYER

🧯 If You Can't Patch

  • Remove the LUNA RADIO PLAYER plugin completely from your WordPress installation
  • Implement strict file permissions (chmod 600) on sensitive files like wp-config.php and restrict web server user access

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → LUNA RADIO PLAYER version. If version is 6.24.01.24 or lower, you are vulnerable.

Check Version:

# Check via WordPress CLI
wp plugin get luna-radio-player --field=version

# Or check file directly
cat /path/to/wp-content/plugins/luna-radio-player/luna-radio-player.php | grep 'Version:'

Verify Fix Applied:

After updating, verify plugin version is higher than 6.24.01.24. Test by attempting to access /wp-content/plugins/luna-radio-player/js/fallback.php?file=../../../wp-config.php - should return 403 or error.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /wp-content/plugins/luna-radio-player/js/fallback.php with ../ patterns in query string
  • Unusual file access patterns from single IPs to plugin directory

Network Indicators:

  • GET requests containing directory traversal sequences (../) to fallback.php endpoint
  • Traffic spikes to the vulnerable endpoint from external IPs

SIEM Query:

source="web_access_logs" AND uri_path="/wp-content/plugins/luna-radio-player/js/fallback.php" AND (query="*../*" OR query="*..\\*" OR status=200)

🔗 References

📤 Share & Export