Page 3 of 14 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 3

The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! returns the MySQL password in cleartext to a text box in the configuration panel, which allows remote attackers to obtain sensitive information via unspecified vectors. El plugin XCloner 3.1.1 para WordPress y 3.5.1 para Joomla! devuelve la contraseña MySQL en texto plano al cuadro de texto en el panel de configuración, lo que permite a atacantes remotos obtener información sensible a través de vectores no especificados. XCloner plugin version 3.1.1 for WordPress and 3.5.1 for Joomla! • https://www.exploit-db.com/exploits/35212 http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1 http://www.vapid.dhs.org/advisory.php?v=110 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 3

XCloner Standalone 3.5 and earlier, when enable_db_backup and sql_mem are enabled, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the dbbackup_comp parameter in a generate action to index2.php. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have the privileges to execute code. NOTE: this can be leveraged by remote attackers using CVE-2014-2579. XCloner Standalone 3.5 y anteriores, cuando enable_db_backup y sql_mem están habilitados, permite a administradores remotos autenticados ejecutar comandos arbitrarios a través de metacaracteres de shell en el parámetro dbbackup_comp en una acción generate hacia index2.php. NOTA: ino está claro si este problema cruza límites de privilegio, como administradores podrían ya tener los privilegios para ejecutar código. • https://www.exploit-db.com/exploits/32790 http://www.exploit-db.com/exploits/32790 http://www.securityfocus.com/archive/1/531780/100/0/threaded https://www.htbridge.com/advisory/HTB23207 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 3

Multiple cross-site request forgery (CSRF) vulnerabilities in XCloner Standalone 3.5 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrator password via the config task to index2.php or (2) when the enable_db_backup and sql_mem options are enabled, access the database backup functionality via the dbbackup_comp parameter in the generate action to index2.php. NOTE: vector 2 might be a duplicate of CVE-2014-2340, which is for the XCloner Wordpress plugin. NOTE: remote attackers can leverage CVE-2014-2996 with vector 2 to execute arbitrary commands. Múltiples vulnerabilidades de CSRF en XCloner Standalone 3.5 y anteriores permiten a atacantes remotos secuestrar la autenticación de administradores para solicitudes que (1) cambian la contraseña de administrador a través de la tarea config hacia index2.php o (2) cuando las opciones enable_db_backup y sql_mem están habilitadas, acceder a la funcionalidad de copia de seguridad de la base de datos a través del parámetro dbbackup_comp en la acción generate hacia index2.php. NOTA: vector 2 podría ser un duplicado de CVE-2014-2340, lo que es para el plugin XCloner Wordpress. • https://www.exploit-db.com/exploits/32790 http://www.exploit-db.com/exploits/32790 http://www.securityfocus.com/archive/1/531780/100/0/threaded http://www.securityfocus.com/bid/66751 https://www.htbridge.com/advisory/HTB23207 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.8EPSS: 1%CPEs: 13EXPL: 3

Cross-site request forgery (CSRF) vulnerability in the XCloner plugin before 3.1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that create website backups via a request to wp-admin/plugins.php. Vulnerabilidad de CSRF en el plugin XCloner anterior a 3.1.1 para WordPress permite a atacantes remotos secuestrar la autenticación de administradores para solicitudes que crean copias de seguridad del sitio web a través de una solicitud hacia wp-admin/plugins.php. WordPress XCloner plugin version 3.1.0 suffers from a cross site request forgery vulnerability. • https://www.exploit-db.com/exploits/32701 http://secunia.com/advisories/57362 http://wordpress.org/plugins/xcloner-backup-and-restore/changelog http://www.exploit-db.com/exploits/32701 http://www.securityfocus.com/archive/1/531712/100/0/threaded http://www.securityfocus.com/bid/66280 https://www.htbridge.com/advisory/HTB23206 • CWE-352: Cross-Site Request Forgery (CSRF) •