vendor:
WordPress
by:
Sense of Security
8.5
CVSS
HIGH
Code Execution
94
CWE
Product Name: WordPress
Affected Version From: 2.1.2004
Affected Version To: 2.1.2004
Patch Exists: YES
Related CWE: Not yet assigned
CPE: a:backwpup:backwpup
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2011
Sense of Security – Security Advisory – SOS-11-012
A vulnerability has been discovered in the WordPress plugin BackWPup 2.1.4 which can be exploited to execute local or remote code on the web server. There is a lack of data validation on the BackWPUpJobTemp POST parameter of job/wp_export_generate.php allowing an attacker to specify FTP resources as input. This resource is downloaded and deserialised by the wp_export_generate.php script and variables from this deserialisation are later passed to require_once.
Mitigation:
Upgrade to 2.1.5