CVE-2024-13538
📋 TL;DR
The BigBuy Dropshipping Connector for WooCommerce WordPress plugin discloses the full server path through an accessible vendor file that triggers an error. This information disclosure vulnerability affects all WordPress sites using this plugin up to version 1.9.19. While not directly damaging, the exposed path information can assist attackers in exploiting other vulnerabilities.
💻 Affected Systems
- BigBuy Dropshipping Connector for WooCommerce WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers combine the path disclosure with another vulnerability (like file inclusion or directory traversal) to execute arbitrary code, upload malicious files, or access sensitive system files.
Likely Case
Attackers gather reconnaissance information about the server structure to plan more sophisticated attacks against the WordPress installation.
If Mitigated
Minimal impact as the path information alone doesn't enable direct compromise, though it still provides useful reconnaissance data to attackers.
🎯 Exploit Status
Exploitation requires only accessing a specific URL path. The vulnerability is simple to exploit but requires additional vulnerabilities to cause significant damage.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.9.20 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/bigbuy-wc-dropshipping-connector
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'BigBuy Dropshipping Connector for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.9.20+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Block access to vulnerable file
allUse web server configuration to block access to the vulnerable PHP file
For Apache: Add 'Deny from all' to .htaccess in plugin directory
For Nginx: Add 'location ~* /vendor/cocur/slugify/bin/generate-default.php { deny all; }' to site config
Remove vulnerable file
linuxDelete the vulnerable file from the server
rm -f /path/to/wordpress/wp-content/plugins/bigbuy-wc-dropshipping-connector/vendor/cocur/slugify/bin/generate-default.php
🧯 If You Can't Patch
- Disable the BigBuy Dropshipping Connector plugin temporarily
- Implement web application firewall rules to block requests to the vulnerable path
🔍 How to Verify
Check if Vulnerable:
Access https://your-site.com/wp-content/plugins/bigbuy-wc-dropshipping-connector/vendor/cocur/slugify/bin/generate-default.php - if it returns an error showing full server paths, you're vulnerable.
Check Version:
Check WordPress admin panel → Plugins → BigBuy Dropshipping Connector, or examine the plugin's main PHP file header for version number.
Verify Fix Applied:
After updating, attempt to access the same URL - it should return a 403/404 error or be completely inaccessible.
📡 Detection & Monitoring
Log Indicators:
- HTTP 200/500 responses to requests for /vendor/cocur/slugify/bin/generate-default.php
- Error logs containing full server path disclosures
Network Indicators:
- GET requests to the vulnerable file path from external IPs
- Unusual scanning patterns targeting vendor directories
SIEM Query:
source="web_access_logs" AND uri="/wp-content/plugins/bigbuy-wc-dropshipping-connector/vendor/cocur/slugify/bin/generate-default.php"