The Backup Migration plugin for WordPress is vulnerable to OS Command Injection in all versions up to, and including, 1.3.9 via the 'url' parameter. This vulnerability allows authenticated attackers, with administrator-level permissions and above, to execute arbitrary commands on the host operating system.
References
Configurations
History
21 Nov 2024, 08:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1503 - Exploit | |
References | () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1518 - Exploit | |
References | () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L88 - Exploit | |
References | () https://plugins.trac.wordpress.org/changeset/3012745/backup-backup - Patch | |
References | () https://www.linuxquestions.org/questions/linux-security-4/php-function-exec-enabled-how-big-issue-4175508082/ - Patch, Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve - Third Party Advisory | |
Summary | (es) El complemento Backup Migration para WordPress es vulnerable a la inyección de comandos del sistema operativo en todas las versiones hasta la 1.3.9 inclusive a través del parámetro 'url'. Esta vulnerabilidad permite a atacantes autenticados, con permisos de nivel de administrador y superiores, ejecutar comandos arbitrarios en el sistema operativo host. |
29 Dec 2023, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1503 - Exploit | |
References | () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1518 - Exploit | |
References | () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L88 - Exploit | |
References | () https://plugins.trac.wordpress.org/changeset/3012745/backup-backup - Patch | |
References | () https://www.linuxquestions.org/questions/linux-security-4/php-function-exec-enabled-how-big-issue-4175508082/ - Patch, Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve - Third Party Advisory | |
CWE | CWE-78 | |
Summary |
|
|
First Time |
Backupbliss
Backupbliss backup Migration |
|
CPE | cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:* |
23 Dec 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-23 02:15
Updated : 2024-11-21 08:45
NVD link : CVE-2023-7002
Mitre link : CVE-2023-7002
CVE.ORG link : CVE-2023-7002
JSON object : View
Products Affected
backupbliss
- backup_migration
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')