CVE-2024-3229
📋 TL;DR
This vulnerability allows unauthenticated attackers to upload arbitrary files to WordPress sites using the Salon booking system plugin. It affects all versions up to 10.2 due to missing file type validation and authorization checks, potentially leading to remote code execution.
💻 Affected Systems
- Salon booking system WordPress plugin
📦 What is this software?
Salon Booking System by Salonbookingsystem
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise via remote code execution, allowing attackers to install malware, steal data, or use the server for further attacks.
Likely Case
Website defacement, malware distribution, or backdoor installation leading to data theft and unauthorized access.
If Mitigated
Limited impact with proper file upload restrictions and web application firewalls in place.
🎯 Exploit Status
Simple HTTP POST requests can trigger the vulnerability without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.3 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3103584/salon-booking-system/trunk/src/SLN/Action/Ajax/ImportAssistants.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Salon booking system plugin. 4. Click Update Now to version 10.3+. 5. Verify update completes successfully.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Salon booking system plugin until patched.
wp plugin deactivate salon-booking-system
Web Application Firewall rule
allBlock requests to the vulnerable endpoint.
Block POST requests to /wp-admin/admin-ajax.php?action=sln_import_assistants
🧯 If You Can't Patch
- Implement strict file upload restrictions at web server level
- Deploy intrusion detection systems to monitor for file upload attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Salon booking system version. If version is 10.2 or lower, you are vulnerable.
Check Version:
wp plugin get salon-booking-system --field=version
Verify Fix Applied:
Confirm plugin version is 10.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin-ajax.php with action=sln_import_assistants
- Unexpected file uploads in uploads directory
Network Indicators:
- HTTP POST requests with file uploads to vulnerable endpoint from unauthenticated sources
SIEM Query:
source="web_server" AND (uri="/wp-admin/admin-ajax.php" AND parameters.action="sln_import_assistants")
🔗 References
- https://plugins.trac.wordpress.org/changeset/3103584/salon-booking-system/trunk/src/SLN/Action/Ajax/ImportAssistants.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3bbbf5be-5c0a-4514-88ac-003083c0bba3?source=cve
- https://plugins.trac.wordpress.org/changeset/3103584/salon-booking-system/trunk/src/SLN/Action/Ajax/ImportAssistants.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3bbbf5be-5c0a-4514-88ac-003083c0bba3?source=cve