CVE-2013-2741

importbuddy.php in the BackupBuddy plugin 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4 for WordPress does not require that authentication be enabled, which allows remote attackers to obtain sensitive information, or overwrite or delete files, via vectors involving a (1) direct request, (2) step=1 request, (3) step=2 or step=3 request, or (4) step=7 request.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:ithemes:backupbuddy:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:ithemes:backupbuddy:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ithemes:backupbuddy:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:ithemes:backupbuddy:2.2.25:*:*:*:*:*:*:*
cpe:2.3:a:ithemes:backupbuddy:2.2.28:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:52

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2013-03/0205.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2013-03/0205.html - Exploit
References () http://packetstormsecurity.com/files/120923 - Exploit () http://packetstormsecurity.com/files/120923 - Exploit

Information

Published : 2013-04-02 12:09

Updated : 2024-11-21 01:52


NVD link : CVE-2013-2741

Mitre link : CVE-2013-2741

CVE.ORG link : CVE-2013-2741


JSON object : View

Products Affected

wordpress

  • wordpress

ithemes

  • backupbuddy
CWE
CWE-287

Improper Authentication