// For flags

CVE-2014-2579

Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.0 - Multiple Cross-Site Request Forgery

Severity Score

9.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple cross-site request forgery (CSRF) vulnerabilities in XCloner Standalone 3.5 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrator password via the config task to index2.php or (2) when the enable_db_backup and sql_mem options are enabled, access the database backup functionality via the dbbackup_comp parameter in the generate action to index2.php. NOTE: vector 2 might be a duplicate of CVE-2014-2340, which is for the XCloner Wordpress plugin. NOTE: remote attackers can leverage CVE-2014-2996 with vector 2 to execute arbitrary commands.

Múltiples vulnerabilidades de CSRF en XCloner Standalone 3.5 y anteriores permiten a atacantes remotos secuestrar la autenticación de administradores para solicitudes que (1) cambian la contraseña de administrador a través de la tarea config hacia index2.php o (2) cuando las opciones enable_db_backup y sql_mem están habilitadas, acceder a la funcionalidad de copia de seguridad de la base de datos a través del parámetro dbbackup_comp en la acción generate hacia index2.php. NOTA: vector 2 podría ser un duplicado de CVE-2014-2340, lo que es para el plugin XCloner Wordpress. NOTA: atacantes remotos pueden aprovechar CVE-2014-2996 con vector 2 para ejecutar comandos arbitrarios.

Multiple cross-site request forgery (CSRF) vulnerabilities in XCloner Standalone 3.1.0 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrator password via the config task to index2.php or (2) when the enable_db_backup and sql_mem options are enabled, access the database backup functionality via the dbbackup_comp parameter in the generate action to index2.php. NOTE: vector 2 might be a duplicate of CVE-2014-2340, which is for the XCloner Wordpress plugin. NOTE: remote attackers can leverage CVE-2014-2996 with vector 2 to execute arbitrary commands.

XCloner Standalone version 3.5 suffers from a cross site request forgery vulnerability.

*Credits: High-Tech Bridge Security Research Lab
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-03-21 CVE Reserved
  • 2014-04-09 CVE Published
  • 2014-04-10 First Exploit
  • 2024-04-23 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xcloner
Search vendor "Xcloner"
Xcloner
Search vendor "Xcloner" for product "Xcloner"
<= 3.5
Search vendor "Xcloner" for product "Xcloner" and version " <= 3.5"
standalone
Affected