CVE-2024-35754

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in the Ovic Importer WordPress plugin allows attackers to download arbitrary files from the server by manipulating file paths. It affects all WordPress sites using Ovic Importer versions up to 1.6.3. The vulnerability enables unauthorized access to sensitive files including configuration files and database credentials.

💻 Affected Systems

Products:
  • Ovic Team Ovic Importer WordPress Plugin
Versions: n/a through 1.6.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via retrieval of wp-config.php containing database credentials, followed by database takeover and potential remote code execution.

🟠

Likely Case

Sensitive file disclosure including configuration files, user data, and potentially credentials leading to data breach.

🟢

If Mitigated

Limited impact with proper file permissions and web server restrictions preventing access to critical system files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Patchstack; simple HTTP requests can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.4 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/ovic-import-demo/wordpress-ovic-importer-plugin-1-6-3-arbitrary-file-download-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Ovic Importer and update to version 1.6.4 or later. 4. If update not available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate the Ovic Importer plugin to prevent exploitation

wp plugin deactivate ovic-import-demo

Web Server File Restriction

linux

Configure web server to block directory traversal attempts

# For Apache: add to .htaccess
<FilesMatch "\.\.">
    Order Allow,Deny
    Deny from all
</FilesMatch>
# For Nginx: add to server block
location ~ /\.\./ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Immediately deactivate the Ovic Importer plugin via WordPress admin or command line.
  • Implement WAF rules to block path traversal patterns and monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin plugins page for Ovic Importer version. If version is 1.6.3 or earlier, system is vulnerable.

Check Version:

wp plugin get ovic-import-demo --field=version

Verify Fix Applied:

Verify plugin version is 1.6.4 or later in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' patterns to plugin endpoints
  • Unusual file access patterns from single IP addresses
  • Requests to /wp-content/plugins/ovic-import-demo/ with traversal sequences

Network Indicators:

  • HTTP GET requests with file traversal parameters
  • Abnormal file download patterns from WordPress instances

SIEM Query:

source="web_access.log" AND (uri="*ovic-import-demo*" AND (uri="*..*" OR uri="*%2e%2e*"))

🔗 References

📤 Share & Export