WordPress Plugin Vulnerabilities
BackWPup < 4.0.2 - Admin+ Directory Traversal
Description
The plugin for WordPress is vulnerable to Directory Traversal via the job-specific backup folder. This allows high privilege users, such as administrator to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.
Affects Plugins
References
Classification
Type
TRAVERSAL
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Marco Wotschka
Verified
No
WPVDB ID
Timeline
Publicly Published
2024-08-16 (about 1 year ago)
Added
2024-08-19 (about 1 year ago)
Last Updated
2024-08-19 (about 1 year ago)