WordPress Plugin 'Really Simple Security Pro Multisite' 9.0.0 < 9.1.2 Authentication Bypass

critical Nessus Plugin ID 211679

Synopsis

The remote WordPress application has a plugin installed that is affected by an authentication bypass vulnerability.

Description

The WordPress application running on the remote host has a version of the 'Really Simple Security Pro Multisite' plugin that is 9.0.x prior to 9.1.2. It is, therefore, affected by an authentication bypass vulnerability. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the 'Two-Factor Authentication' setting is enabled (disabled by default).

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the 'Really Simple Security Pro Multisite' plugin to version 9.1.2 or later through the administrative dashboard.

See Also

https://wordpress.org/plugins/really-simple-ssl

http://www.nessus.org/u?d65f1bcb

Plugin Details

Severity: Critical

ID: 211679

File Name: wordpress_plugin_really_simple_security_pro_multisite_CVE-2024-10924.nasl

Version: 1.1

Type: remote

Family: CGI abuses

Published: 11/21/2024

Updated: 11/21/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-10924

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:really_simple_security:really_simple_ssl

Required KB Items: installed_sw/WordPress, www/PHP

Patch Publication Date: 11/14/2024

Vulnerability Publication Date: 11/14/2024

Reference Information

CVE: CVE-2024-10924