CVE-2022-0444 – XCloner < 4.3.6 - Plugin Settings Reset
https://notcve.org/view.php?id=CVE-2022-0444
The Backup, Restore and Migrate WordPress Sites With the XCloner Plugin WordPress plugin before 4.3.6 does not have authorisation and CSRF checks when resetting its settings, allowing unauthenticated attackers to reset them, including generating a new backup encryption key. El plugin Backup, Restore and Migrate WordPress Sites With the XCloner Plugin de WordPress versiones anteriores a 4.3.6, no dispone de comprobaciones de autorización y de tipo CSRF cuando son restablecidos sus ajustes, lo que permite a atacantes no autenticados restablecerlos, incluyendo la generación de una nueva clave de cifrado de la copia de seguridad • https://wpscan.com/vulnerability/9567d295-43c7-4e59-9283-c7726f16d40b • CWE-352: Cross-Site Request Forgery (CSRF) CWE-862: Missing Authorization •
CVE-2020-35950 – Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 4.2.152 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2020-35950
An issue was discovered in the XCloner Backup and Restore plugin before 4.2.153 for WordPress. It allows CSRF (via almost any endpoint). Se detectó un problema en el plugin XCloner Backup and Restore versiones anteriores a 4.2.153 para WordPress. Permite un ataque de tipo CSRF (por medio de casi cualquier endpoint). • https://wpscan.com/vulnerability/10413 https://www.wordfence.com/blog/2020/09/critical-vulnerabilities-patched-in-xcloner-backup-and-restore-plugin • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2020-13424
https://notcve.org/view.php?id=CVE-2020-13424
The XCloner component before 3.5.4 for Joomla! allows Authenticated Local File Disclosure. El componente XCloner versiones anteriores a 3.5.4 para Joomla!, permite una Divulgación de Archivo Local Autenticada • https://github.com/mkelepce/CVE-2020-13424 https://www.xcloner.com/xcloner-news/security-release-available-for-archived-joomla-version •
CVE-2014-2996 – XCloner Standalone 3.5 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2014-2996
XCloner Standalone 3.5 and earlier, when enable_db_backup and sql_mem are enabled, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the dbbackup_comp parameter in a generate action to index2.php. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have the privileges to execute code. NOTE: this can be leveraged by remote attackers using CVE-2014-2579. XCloner Standalone 3.5 y anteriores, cuando enable_db_backup y sql_mem están habilitados, permite a administradores remotos autenticados ejecutar comandos arbitrarios a través de metacaracteres de shell en el parámetro dbbackup_comp en una acción generate hacia index2.php. NOTA: ino está claro si este problema cruza límites de privilegio, como administradores podrían ya tener los privilegios para ejecutar código. • https://www.exploit-db.com/exploits/32790 http://www.exploit-db.com/exploits/32790 http://www.securityfocus.com/archive/1/531780/100/0/threaded https://www.htbridge.com/advisory/HTB23207 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2014-2579 – Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.0 - Multiple Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2014-2579
Multiple cross-site request forgery (CSRF) vulnerabilities in XCloner Standalone 3.5 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrator password via the config task to index2.php or (2) when the enable_db_backup and sql_mem options are enabled, access the database backup functionality via the dbbackup_comp parameter in the generate action to index2.php. NOTE: vector 2 might be a duplicate of CVE-2014-2340, which is for the XCloner Wordpress plugin. NOTE: remote attackers can leverage CVE-2014-2996 with vector 2 to execute arbitrary commands. Múltiples vulnerabilidades de CSRF en XCloner Standalone 3.5 y anteriores permiten a atacantes remotos secuestrar la autenticación de administradores para solicitudes que (1) cambian la contraseña de administrador a través de la tarea config hacia index2.php o (2) cuando las opciones enable_db_backup y sql_mem están habilitadas, acceder a la funcionalidad de copia de seguridad de la base de datos a través del parámetro dbbackup_comp en la acción generate hacia index2.php. NOTA: vector 2 podría ser un duplicado de CVE-2014-2340, lo que es para el plugin XCloner Wordpress. • https://www.exploit-db.com/exploits/32790 http://www.exploit-db.com/exploits/32790 http://www.securityfocus.com/archive/1/531780/100/0/threaded http://www.securityfocus.com/bid/66751 https://www.htbridge.com/advisory/HTB23207 • CWE-352: Cross-Site Request Forgery (CSRF) •