7.5
CVE-2013-2741
- EPSS 0.66%
- Veröffentlicht 02.04.2013 12:09:11
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
BackupBuddy < 3.0 - Authentication Bypass
importbuddy.php in the BackupBuddy plugin 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4 for WordPress does not require that authentication be enabled, which allows remote attackers to obtain sensitive information, or overwrite or delete files, via vectors involving a (1) direct request, (2) step=1 request, (3) step=2 or step=3 request, or (4) step=7 request.
Mögliche Gegenmaßnahme
BackupBuddy: Update to version 3.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
BackupBuddy
Version
[*, 3.0)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ithemes ≫ Backupbuddy Version1.3.4
Ithemes ≫ Backupbuddy Version2.1.4
Ithemes ≫ Backupbuddy Version2.2.4
Ithemes ≫ Backupbuddy Version2.2.25
Ithemes ≫ Backupbuddy Version2.2.28
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.66% | 0.702 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.