{ "id": "CVE-2024-9593", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T18:15:04.540", "lastModified": "2024-10-29T13:40:23.983", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified." }, { "lang": "es", "value": "El complemento Time Clock y el complemento Time Clock Pro para WordPress son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo en versiones hasta la 1.2.2 (para Time Clock) y la 1.1.4 (para Time Clock Pro) incluida, a trav\u00e9s de la funci\u00f3n 'etimeclockwp_load_function_callback'. Esto permite que atacantes no autenticados ejecuten c\u00f3digo en el servidor. No se pueden especificar los par\u00e1metros de la funci\u00f3n invocada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "baseScore": 8.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 3.9, "impactScore": 3.7 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "baseScore": 8.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 3.9, "impactScore": 3.7 } ] }, "weaknesses": [ { "source": "security@wordfence.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-94" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:wpplugin:time_clock:*:*:*:*:pro:wordpress:*:*", "versionEndIncluding": "1.1.4", "matchCriteriaId": "B057E167-BA8B-4556-924E-9F1641ABB35F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:wpplugin:time_clock:*:*:*:*:-:wordpress:*:*", "versionEndIncluding": "1.2.2", "matchCriteriaId": "C1CE6396-E04F-47F3-B8D0-E1A0CB2DEEB8" } ] } ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/time-clock/tags/1.2.2/includes/admin/ajax_functions_admin.php#L58", "source": "security@wordfence.com", "tags": [ "Product" ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3171046/time-clock#file40", "source": "security@wordfence.com", "tags": [ "Product" ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/247e599a-74e2-41d5-a1ba-978a807e6544?source=cve", "source": "security@wordfence.com", "tags": [ "Third Party Advisory" ] } ] }