GobyVuls/CVE-2022-31474.md
Goby ca100a8082
Create CVE-2022-31474.md
add CVE-2022-31474
2023-04-01 12:40:51 +08:00

13 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

## WordPress Plugin BackupBuddy Arbitrary File Read Vulnerability (CVE-2022-31474)
| **Vulnerability** | **WordPress Plugin BackupBuddy Arbitrary File Read Vulnerability (CVE-2022-31474)** |
| :----: | :-----|
| **Chinese name** | WordPress BackupBuddy 插件 local-download 参数任意文件读取漏洞CVE-2022-31474 |
| **CVSS core** | 7.5 |
| **FOFA Query** (click to view the results directly)| [header="WordPress" \|\| header="api.w.org" \|\| body="/wp-content/themes/"](https://fofa.info/result?qbase64=aGVhZGVyPSJXb3JkUHJlc3MiIHx8IGhlYWRlcj0iYXBpLncub3JnIiB8fCBib2R5PSIvd3AtY29udGVudC90aGVtZXMvIg%3D%3D) |
| **Number of assets affected** | 34049801 |
| **Description** | WordPress BackupBuddy plugin is a fast and simple plugin for WordPress backup and restore. WordPress plugin BackupBuddy versions 8.5.8.0 to 8.7.4.1 have an information disclosure vulnerability, which stems from an arbitrary file read and download vulnerability. |
| **Impact** | Attackers can use this vulnerability to read the leaked source code, database configuration files, etc., resulting in an extremely insecure website. |
![](https://s3.bmp.ovh/imgs/2023/04/01/0b9fb8da4ab364e1.gif)