Update metadata and improve template quality

This commit is contained in:
Prince Chaddha
2025-11-30 10:51:35 +00:00
parent f6d979b95a
commit e7cc1f0ab0

View File

@@ -1,13 +1,14 @@
id: CVE-2023-6266
info:
name: WordPress Backup Migration - Unauthorized Access
name: WordPress Backup Migration - Unauthorized Access
author: riteshs4hu
severity: high
description: |
Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP.
The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP parameter in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download arbitrary backup files.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-6266
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d1b3b1e5-3b3e-4b3e-8b3e-3b3e3b3e3b3e
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
@@ -17,7 +18,11 @@ info:
metadata:
verified: true
max-request: 1
tags: wordpress,backup
vendor: backupbliss
product: backup_migration
shodan-query: http.html:/wp-content/plugins/backup-backup/
fofa-query: body=/wp-content/plugins/backup-backup/
tags: cve,cve2023,wordpress,backup,backupbliss,unauth
variables:
file: "{{randstr}}.zip"
@@ -29,9 +34,14 @@ requests:
Host: {{Hostname}}
redirects: false
matchers-condition: and
matchers:
- type: word
part: header
words:
- "{{file}}"
- type: status
status:
- 200