Lucene search

K
cve[email protected]CVE-2024-0697
HistoryJan 27, 2024 - 5:15 a.m.

CVE-2024-0697

2024-01-2705:15:08
CWE-22
web.nvd.nist.gov
11
wordpress
backuply
plugin
vulnerability
cve-2024-0697
directory traversal
cybersecurity

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.2%

The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.2.3 via the node_id parameter in the backuply_get_jstree function. This makes it possible for attackers with administrator privileges or higher to read the contents of arbitrary files on the server, which can contain sensitive information.

Affected configurations

Vulners
NVD
Node
softaculousbackuplyRange1.2.3
VendorProductVersionCPE
softaculousbackuply*cpe:2.3:a:softaculous:backuply:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "softaculous",
    "product": "Backuply – Backup, Restore, Migrate and Clone",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.2.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.2%