CVE-2023-7002

The Backup Migration plugin for WordPress is vulnerable to OS Command Injection in all versions up to, and including, 1.3.9 via the 'url' parameter. This vulnerability allows authenticated attackers, with administrator-level permissions and above, to execute arbitrary commands on the host operating system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*

History

29 Dec 2023, 06:21

Type Values Removed Values Added
First Time Backupbliss
Backupbliss backup Migration
CPE cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1503 - () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1503 - Exploit
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1518 - () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L1518 - Exploit
References () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L88 - () https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.3.9/includes/ajax.php#L88 - Exploit
References () https://plugins.trac.wordpress.org/changeset/3012745/backup-backup - () https://plugins.trac.wordpress.org/changeset/3012745/backup-backup - Patch
References () https://www.linuxquestions.org/questions/linux-security-4/php-function-exec-enabled-how-big-issue-4175508082/ - () https://www.linuxquestions.org/questions/linux-security-4/php-function-exec-enabled-how-big-issue-4175508082/ - Patch, Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve - Third Party Advisory
CWE CWE-78
Summary
  • (es) Backup Migration plugin for WordPress es vulnerable a la inyección de comandos del sistema operativo en todas las versiones hasta la 1.3.9 inclusive a través del parámetro 'url'. Esta vulnerabilidad permite a atacantes autenticados, con permisos de nivel de administrador y superiores, ejecutar comandos arbitrarios en el sistema operativo host.

23 Dec 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-23 02:15

Updated : 2023-12-29 06:21


NVD link : CVE-2023-7002

Mitre link : CVE-2023-7002

CVE.ORG link : CVE-2023-7002


JSON object : View

Products Affected

backupbliss

  • backup_migration
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')