QID 150570
Date Published: 2022-09-18
QID 150570: WordPress BackupBuddy Plugin: Arbitrary File Read Vulnerability (CVE-2022-31474)
The BackupBuddy plugin for WordPress is designed to make back-up management easy for WordPress site owners.
Affected versions of BackupBuddy plugin do not validate the URL parameter in "local-download" and/or "local-destination-id" AJAX action before using it and returning its content in HTTP response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc).
Affected versions:
BackupBuddy versions 8.5.8.0 through 8.7.4.1.
QID Detection Logic (Unauthenticated) :
This QID sends an HTTP GET request to access the server file /etc/passwd and based on the response confirms if the target is vulnerable.
Successful exploitation of the vulnerability may allow remote attackers to read sensitive files on the target server.
For more information regarding this vulnerability please refer BackupBuddy Security Advisory.
- BackupBuddy Security Advisory -
ithemes.com/blog/wordpress-vulnerability-report-special-edition-september-6-2022-backupbuddy/
CVEs related to QID 150570
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| BackupBuddy Security Advisory |
|