CVE-2024-13671

7.5 HIGH

📋 TL;DR

The Music Sheet Viewer WordPress plugin contains an arbitrary file read vulnerability that allows unauthenticated attackers to read any file on the server. This affects all WordPress sites using version 4.1 or earlier of the plugin, potentially exposing sensitive configuration files, credentials, and other confidential data.

💻 Affected Systems

Products:
  • Music Sheet Viewer WordPress Plugin
Versions: All versions up to and including 4.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain database credentials, SSH keys, or other sensitive files leading to complete server compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Attackers read wp-config.php to obtain database credentials, potentially leading to database compromise and site defacement or data exfiltration.

🟢

If Mitigated

With proper file permissions and web server restrictions, attackers can only read publicly accessible files, limiting exposure to non-sensitive information.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the read_score_file() function which doesn't properly validate file paths, allowing directory traversal attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3158475/music-sheet-viewer/trunk/music-sheet-viewer.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Music Sheet Viewer plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate the Music Sheet Viewer plugin to prevent exploitation

Web Server Restrictions

all

Add web server rules to block access to the vulnerable endpoint

# Apache: Add to .htaccess
RewriteEngine On
RewriteRule ^wp-content/plugins/music-sheet-viewer/.*\.php$ - [F,L]
# Nginx: Add to server block
location ~ ^/wp-content/plugins/music-sheet-viewer/.*\.php$ { deny all; }

🧯 If You Can't Patch

  • Deactivate and remove the Music Sheet Viewer plugin immediately
  • Implement web application firewall rules to block directory traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Music Sheet Viewer version 4.1 or earlier

Check Version:

# Check via WP-CLI
wp plugin list --name='music-sheet-viewer' --field=version

Verify Fix Applied:

Verify plugin version is 4.2 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/music-sheet-viewer/ with file path parameters containing '../' sequences
  • Multiple failed attempts to access sensitive files like wp-config.php, .env, or /etc/passwd

Network Indicators:

  • Unusual file read patterns from external IPs targeting the plugin endpoint
  • Traffic spikes to the plugin's PHP files with parameter manipulation

SIEM Query:

source="web_access_logs" AND uri_path="/wp-content/plugins/music-sheet-viewer/" AND (query="*../*" OR query="*..%2f*")

🔗 References

📤 Share & Export