The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/163382/WordPress-Backup-Guard-1.5.8-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/163623/WordPress-Backup-Guard-Authenticated-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://wpscan.com/vulnerability/d442acac-4394-45e4-b6bb-adf4a40960fb | Exploit Third Party Advisory |
Configurations
History
03 Dec 2021, 18:31
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (MISC) http://packetstormsecurity.com/files/163382/WordPress-Backup-Guard-1.5.8-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry |
21 Jul 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jul 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE. |
Information
Published : 2021-04-05 19:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-24155
Mitre link : CVE-2021-24155
CVE.ORG link : CVE-2021-24155
JSON object : View
Products Affected
backup-guard
- backup_guard
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type