WordPress plugin simple-backup – Multiple vulnerabilities
It is possible to remotely delete arbitrary files on the webserver on wordpress blogs that have simple-backup plugin installed and enabled. No authentication is required, the default configuration of simple-backup is affected. Example 1 : Delete 'pizza.txt' in wordpress root : http://127.0.0.1/<WP-path>/wp-admin/tools.php?page=backup_manager&delete_backup_file=../pizza.txt Example 2 : Delete .htaccess file protecting the backup folder : http://127.0.0.1/<WP-path>/wp-admin/tools.php?page=backup_manager&delete_backup_file=.htaccess&download_backup_file=inexisting Note : When 'download_backup_file' parameter is provided with an invalid filepath, the PHP script exits prematurely with message 'Access Denied!' and so does not regenerate automaticaly the .htaccess file. After this request, it may be possible (depending on the web server configuration) to browse the backup directory and download server backup files at this URL : http://127.0.0.1/<WP-path>/simple-backup/ The backup archive files may contain all the wordpress files : configuration files (wp-config.php etc.), PHP source code, etc.