CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-0697

High Severity
Softaculous
SVRS
49/100

CVSSv3
4.9/10

EPSS
0.00934/1

CVE-2024-0697 is a Directory Traversal vulnerability in the Backuply WordPress plugin. This flaw allows attackers with administrator access to read sensitive files on the server. The Backuply plugin, versions 1.2.3 and below, is affected via the 'node_id' parameter in the 'backuply_get_jstree' function. Although the CVSS score is 4.9, indicating a medium severity, the associated risk should not be ignored. The SOCRadar Vulnerability Risk Score (SVRS) is 49. Successful exploitation could expose sensitive information, potentially leading to further compromise. Immediate patching or mitigation is recommended to protect against this security risk. Update the Backuply plugin to the latest version to remediate this vulnerability.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:U
C:H
I:N
A:N
2024-01-27

2024-02-01
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-0697 is a Directory Traversal vulnerability in the Backuply – Backup, Restore, Migrate and Clone plugin for WordPress, affecting versions up to 1.2.3. This vulnerability allows attackers with administrator privileges or higher to read the contents of arbitrary files on the server, potentially exposing sensitive information. The SVRS score of 38 indicates a moderate risk, requiring attention and appropriate mitigation measures.

Key Insights:

  1. Exploitability: The vulnerability is exploitable by attackers with administrator privileges or higher, making it a significant concern for WordPress websites with multiple users or administrators.
  2. Information Exposure: Successful exploitation of this vulnerability can lead to the disclosure of sensitive information, including website content, user data, and server configuration files. This can have severe consequences, such as data breaches, unauthorized access, and website defacement.
  3. Remote Attack Possibility: The vulnerability can be exploited remotely, allowing attackers to launch attacks from anywhere with an internet connection. This increases the risk of successful exploitation and makes it more challenging to prevent unauthorized access.

Mitigation Strategies:

  1. Update WordPress and Plugin: The most effective mitigation strategy is to update WordPress and the Backuply plugin to the latest versions. This will patch the vulnerability and prevent attackers from exploiting it.
  2. Restrict Administrator Privileges: Limit the number of users with administrator privileges and ensure that only authorized personnel have access to these accounts. This reduces the potential impact of the vulnerability by limiting the number of individuals who can exploit it.
  3. Implement Strong Password Policies: Enforce strong password policies for all user accounts, including administrators. This makes it more difficult for attackers to guess or brute-force passwords and gain unauthorized access.
  4. Regular Security Audits: Conduct regular security audits to identify and address any vulnerabilities or misconfigurations that could be exploited by attackers. This proactive approach helps maintain a secure website and prevent potential breaches.

Additional Information:

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppSoftaculousbackuply

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026806%40backuply&new=3026806%40backuply&sfp_email=&sfph_mail=
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/70effa22-fbf6-44cb-9d1b-8625969c10ac?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence