mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
Update metadata and improve template quality
This commit is contained in:
@@ -1,13 +1,14 @@
|
||||
id: CVE-2023-6266
|
||||
|
||||
info:
|
||||
name: WordPress Backup Migration - Unauthorized Access
|
||||
name: WordPress Backup Migration - Unauthorized Access
|
||||
author: riteshs4hu
|
||||
severity: high
|
||||
description: |
|
||||
Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP.
|
||||
The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP parameter in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download arbitrary backup files.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2023-6266
|
||||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d1b3b1e5-3b3e-4b3e-8b3e-3b3e3b3e3b3e
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
@@ -17,7 +18,11 @@ info:
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 1
|
||||
tags: wordpress,backup
|
||||
vendor: backupbliss
|
||||
product: backup_migration
|
||||
shodan-query: http.html:/wp-content/plugins/backup-backup/
|
||||
fofa-query: body=/wp-content/plugins/backup-backup/
|
||||
tags: cve,cve2023,wordpress,backup,backupbliss,unauth
|
||||
|
||||
variables:
|
||||
file: "{{randstr}}.zip"
|
||||
@@ -29,9 +34,14 @@ requests:
|
||||
Host: {{Hostname}}
|
||||
|
||||
redirects: false
|
||||
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "{{file}}"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
Reference in New Issue
Block a user