WordPress Plugin Vulnerabilities

VM Backups <= 1.0 - CSRF to Database Backup Download

Description

The plugin does not have CSRF checks, allowing attackers to make a logged in user unwanted actions, such as generate backups of the DB, plugins, and current theme.

The files will be created in the uploads directory by default, with a timestamp in their filenames, without any access restriction, leaving them exposed if an attacker guesses their path or the blog is misconfigured to allow directory listing. However they could also be sent to an arbitrary email address via the CSRF attack as well.

As the plugin uses mysql_connect(), PHP < 7 is required on the target to be able to perform the attack, however a blog using the plugin is likely to be configured this way.

Proof of Concept

Affects Plugins

No known fix

References

Classification

Miscellaneous

Original Researcher
0xB9
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-03-13 (about 4 years ago)
Added
2021-03-13 (about 4 years ago)
Last Updated
2021-05-08 (about 4 years ago)

Other