CVE-2014-8603
Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.1 - Remote Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
cloner.functions.php in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to execute arbitrary code via shell metacharacters in the (1) file name when creating a backup or vectors related to the (2) $_CONFIG[tarpath], (3) $exclude, (4) $_CONFIG['tarcompress'], (5) $_CONFIG['filename'], (6) $_CONFIG['exfile_tar'], (7) $_CONFIG[sqldump], (8) $_CONFIG['mysql_host'], (9) $_CONFIG['mysql_pass'], (10) $_CONFIG['mysql_user'], (11) $database_name, or (12) $sqlfile variable.
cloner.functions.php en el plugin XCloner 3.1.1 para WordPress y 3.5.1 para Joomla! permite a administradores remotos ejecutar código arbitrario a través de metacaracteres de shell en (1) el nombre de fichero cuando crea una copia de seguridad o vectores relacionados con la variable (2) $_CONFIG[tarpath], (3) $exclude, (4) $_CONFIG['tarcompress'], (5) $_CONFIG['filename'], (6) $_CONFIG['exfile_tar'], (7) $_CONFIG[sqldump], (8) $_CONFIG['mysql_host'], (9) $_CONFIG['mysql_pass'], (10) $_CONFIG['mysql_user'], (11) $database_name o (12) $sqlfile.
XCloner plugin version 3.1.1 for WordPress and 3.5.1 for Joomla! suffers from arbitrary command execution, MySQL password disclosure, database backups exposed, unauthenticated remote access, and various other vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-10-17 CVE Published
- 2014-11-04 CVE Reserved
- 2014-11-10 First Exploit
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/35212 | 2014-11-10 | |
http://www.vapid.dhs.org/advisories/wordpress/plugins/Xcloner-v3.1.1 | 2024-08-06 | |
http://www.vapid.dhs.org/advisory.php?v=110 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xcloner Search vendor "Xcloner" | Xcloner Search vendor "Xcloner" for product "Xcloner" | 3.1.1 Search vendor "Xcloner" for product "Xcloner" and version "3.1.1" | wordpress |
Affected
| ||||||
Xcloner Search vendor "Xcloner" | Xcloner Search vendor "Xcloner" for product "Xcloner" | 3.5.1 Search vendor "Xcloner" for product "Xcloner" and version "3.5.1" | joomla\! |
Affected
|