CVE-2013-2741
Summary
| CVE | CVE-2013-2741 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-04-02 12:09:00 UTC |
| Updated | 2013-04-02 12:09:00 UTC |
| Description | importbuddy.php in the BackupBuddy plugin 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4 for WordPress does not require that authentication be enabled, which allows remote attackers to obtain sensitive information, or overwrite or delete files, via vectors involving a (1) direct request, (2) step=1 request, (3) step=2 or step=3 request, or (4) step=7 request. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Ithemes | Backupbuddy | 1.3.4 | All | All | All |
| Application | Ithemes | Backupbuddy | 2.1.4 | All | All | All |
| Application | Ithemes | Backupbuddy | 2.2.25 | All | All | All |
| Application | Ithemes | Backupbuddy | 2.2.28 | All | All | All |
| Application | Ithemes | Backupbuddy | 2.2.4 | All | All | All |
| Application | Ithemes | Backupbuddy | 1.3.4 | All | All | All |
| Application | Ithemes | Backupbuddy | 2.1.4 | All | All | All |
| Application | Ithemes | Backupbuddy | 2.2.25 | All | All | All |
| Application | Ithemes | Backupbuddy | 2.2.28 | All | All | All |
| Application | Ithemes | Backupbuddy | 2.2.4 | All | All | All |
| Application | Wordpress | Wordpress | - | All | All | All |
| Application | Wordpress | Wordpress | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Backupbuddy 2.2.4 Sensitive Data Exposure ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit |
| 20130323 Backupbuddy wordpress plugin - sensitive data exposure in importbuddy.php | FULLDISC | archives.neohapsis.com | Exploit |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.