vendor:
Wordpress wpbackupplus
by:
pSyCh0_3D (Arfaoui Moslem)
7,5
CVSS
HIGH
Unauthorized Access
284
CWE
Product Name: Wordpress wpbackupplus
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: win7 32 Bit & Linux Kali
2014
WordPress wpbackupplus Database and files Backup download (0-day)
wpbackupplus make the backup .zip files and not protected. For download all the website files, the attacker can use the URL http://[SITE]/[PATH]/wp-content/uploads/wp-backup-plus/. For download the Database backup, the attacker can use the URL http://[SITE]/[PATH]/wp-content/uploads/wp-backup-plus/temp. The POC is http://[SERVER]/wp-content/uploads/wp-backup-plus/temp/[DATABASE_NAME]_[DATE].sql.
Mitigation:
Ensure that the backup files are stored in a secure location and are not accessible to unauthorized users.