Lucene search

K
wpvulndbDmitrii IgnatyevWPVDB-ID:AD1EF4C5-60C1-4729-81DD-F626AA0CE3FE
HistoryFeb 02, 2024 - 12:00 a.m.

JetBackup < 2.0.9.9 - Directory Listing Exposing Backups

2024-02-0200:00:00
Dmitrii Ignatyev
wpscan.com
6
jetbackup
directory listing
exposing backups
vulnerability
backup files
malicious actors
plugin

9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin doesn’t use index files to prevent public directory listing of sensitive directories in certain configurations, which allows malicious actors to leak backup files. A partial fix was released in 2.0.9.6, removing the ability to list the directory but still allowing direct access to the files by only guessing the timestamp of the backup.

PoC

  1. Run backup function http://your_site/wordpress/wp-admin/admin.php?page=backup_guard_backups 2) When the scan is over, the attacker must sort through the directory “/wordpress/wp-content/uploads/jetbackup/*”, after which there will be a Directory Listing vulnerability in it, which will allow pumping out all backup and all logs. This vulnerability will be available if a person names the file in a simple way.
CPENameOperatorVersion
eq2.0.9.9

9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPVDB-ID:AD1EF4C5-60C1-4729-81DD-F626AA0CE3FE