CVE-2024-6467

The BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin plugin for WordPress is vulnerable to Arbitrary File Read to Arbitrary File Creation in all versions up to, and including, 1.1.5 via the 'bookingpress_save_lite_wizard_settings_func' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary files that contain the content of files on the server, allowing the execution of any PHP code in those files or the exposure of sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*

History

19 Jul 2024, 15:37

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Reputeinfosystems bookingpress
Reputeinfosystems
References () https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress.php - () https://plugins.trac.wordpress.org/changeset/3116857/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/d0177510-cd7d-4cc5-96c3-78433aa0e3f6?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/d0177510-cd7d-4cc5-96c3-78433aa0e3f6?source=cve - Third Party Advisory
CPE cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*

17 Jul 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-17 07:15

Updated : 2024-07-19 15:37


NVD link : CVE-2024-6467

Mitre link : CVE-2024-6467


JSON object : View

Products Affected

reputeinfosystems

  • bookingpress