mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
59 lines
2.6 KiB
JSON
59 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-2294",
|
|
"sourceIdentifier": "security@wordfence.com",
|
|
"published": "2024-03-16T02:15:09.200",
|
|
"lastModified": "2024-03-17T22:38:29.433",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Backuply \u2013 Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.7 via the backup_name parameter in the backuply_download_backup function. This makes it possible for attackers to have an account with only activate_plugins capability to access arbitrary files on the server, which can contain sensitive information. This only impacts sites hosted on Windows servers."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El complemento Backuply \u2013 Backup, Restore, Migrate and Clone para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 1.2.7 incluida a trav\u00e9s del par\u00e1metro backup_name en la funci\u00f3n backuply_download_backup. Esto hace posible que los atacantes tengan una cuenta con solo la capacidad enable_plugins para acceder a archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial. Esto s\u00f3lo afecta a los sitios alojados en servidores Windows."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@wordfence.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.9,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 1.2,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"references": [
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/browser/backuply/trunk/functions.php#L1615",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/browser/backuply/trunk/main/ajax.php#L78",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3050547%40backuply&new=3050547%40backuply&sfp_email=&sfph_mail=",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be3bd1f2-092c-47c4-a4e4-3365e107c57f?source=cve",
|
|
"source": "security@wordfence.com"
|
|
}
|
|
]
|
|
} |