CVE-2024-13538

5.3 MEDIUM

📋 TL;DR

The BigBuy Dropshipping Connector for WooCommerce WordPress plugin discloses the full server path through an accessible vendor file that triggers an error. This information disclosure vulnerability affects all WordPress sites using this plugin up to version 1.9.19. While not directly damaging, the exposed path information can assist attackers in exploiting other vulnerabilities.

💻 Affected Systems

Products:
  • BigBuy Dropshipping Connector for WooCommerce WordPress plugin
Versions: All versions up to and including 1.9.19
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin activated. The vulnerability exists in a vendor file that shouldn't be publicly accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers combine the path disclosure with another vulnerability (like file inclusion or directory traversal) to execute arbitrary code, upload malicious files, or access sensitive system files.

🟠

Likely Case

Attackers gather reconnaissance information about the server structure to plan more sophisticated attacks against the WordPress installation.

🟢

If Mitigated

Minimal impact as the path information alone doesn't enable direct compromise, though it still provides useful reconnaissance data to attackers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only accessing a specific URL path. The vulnerability is simple to exploit but requires additional vulnerabilities to cause significant damage.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.20 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/bigbuy-wc-dropshipping-connector

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'BigBuy Dropshipping Connector for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.9.20+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Block access to vulnerable file

all

Use web server configuration to block access to the vulnerable PHP file

For Apache: Add 'Deny from all' to .htaccess in plugin directory
For Nginx: Add 'location ~* /vendor/cocur/slugify/bin/generate-default.php { deny all; }' to site config

Remove vulnerable file

linux

Delete the vulnerable file from the server

rm -f /path/to/wordpress/wp-content/plugins/bigbuy-wc-dropshipping-connector/vendor/cocur/slugify/bin/generate-default.php

🧯 If You Can't Patch

  • Disable the BigBuy Dropshipping Connector plugin temporarily
  • Implement web application firewall rules to block requests to the vulnerable path

🔍 How to Verify

Check if Vulnerable:

Access https://your-site.com/wp-content/plugins/bigbuy-wc-dropshipping-connector/vendor/cocur/slugify/bin/generate-default.php - if it returns an error showing full server paths, you're vulnerable.

Check Version:

Check WordPress admin panel → Plugins → BigBuy Dropshipping Connector, or examine the plugin's main PHP file header for version number.

Verify Fix Applied:

After updating, attempt to access the same URL - it should return a 403/404 error or be completely inaccessible.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200/500 responses to requests for /vendor/cocur/slugify/bin/generate-default.php
  • Error logs containing full server path disclosures

Network Indicators:

  • GET requests to the vulnerable file path from external IPs
  • Unusual scanning patterns targeting vendor directories

SIEM Query:

source="web_access_logs" AND uri="/wp-content/plugins/bigbuy-wc-dropshipping-connector/vendor/cocur/slugify/bin/generate-default.php"

🔗 References

📤 Share & Export