CVE-2023-7002

The Backup Migration plugin for WordPress is vulnerable to OS Command Injection in all versions up to, and including, 1.3.9 via the 'url' parameter. This vulnerability allows authenticated attackers, with administrator-level permissions and above, to execute arbitrary commands on the host operating system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:45

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1503 - Exploit () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1503 - Exploit
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1518 - Exploit () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1518 - Exploit
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L88 - Exploit () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L88 - Exploit
References () https://plugins.trac.wordpress.org/changeset/3012745/backup-backup - Patch () https://plugins.trac.wordpress.org/changeset/3012745/backup-backup - Patch
References () https://www.linuxquestions.org/questions/linux-security-4/php-function-exec-enabled-how-big-issue-4175508082/ - Patch, Third Party Advisory () https://www.linuxquestions.org/questions/linux-security-4/php-function-exec-enabled-how-big-issue-4175508082/ - Patch, Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve - Third Party Advisory

29 Dec 2023, 06:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
First Time Backupbliss backup Migration
Backupbliss
References () https://plugins.trac.wordpress.org/changeset/3012745/backup-backup - () https://plugins.trac.wordpress.org/changeset/3012745/backup-backup - Patch
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1518 - () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1518 - Exploit
References () https://www.linuxquestions.org/questions/linux-security-4/php-function-exec-enabled-how-big-issue-4175508082/ - () https://www.linuxquestions.org/questions/linux-security-4/php-function-exec-enabled-how-big-issue-4175508082/ - Patch, Third Party Advisory
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L88 - () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L88 - Exploit
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1503 - () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1503 - Exploit
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve - Third Party Advisory
CWE CWE-78
CPE cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*

23 Dec 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-23 02:15

Updated : 2024-11-21 08:45


NVD link : CVE-2023-7002

Mitre link : CVE-2023-7002

CVE.ORG link : CVE-2023-7002


JSON object : View

Products Affected

backupbliss

  • backup_migration
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')