The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! provides the MySQL username and password on the command line, which allows local users to obtain sensitive information via the ps command.
References
Link | Resource |
---|---|
http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1/ | Exploit |
http://www.vapid.dhs.org/advisory.php?v=110 | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2015-06-10 18:59
Updated : 2024-02-04 18:53
NVD link : CVE-2014-8607
Mitre link : CVE-2014-8607
CVE.ORG link : CVE-2014-8607
JSON object : View
Products Affected
xcloner
- xcloner
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor