First published: Tue Apr 02 2013(Updated: )
importbuddy.php in the BackupBuddy plugin 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4 for WordPress does not reliably delete itself after completing a restore operation, which makes it easier for remote attackers to obtain access via subsequent requests to this script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BackupBuddy | =1.3.4 | |
BackupBuddy | =2.1.4 | |
BackupBuddy | =2.2.4 | |
BackupBuddy | =2.2.25 | |
BackupBuddy | =2.2.28 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2742 has a medium severity rating due to the potential risk of remote code execution.
To fix CVE-2013-2742, upgrade the BackupBuddy plugin to a patched version or remove the importbuddy.php file after a restore operation.
CVE-2013-2742 affects BackupBuddy versions 1.3.4, 2.1.4, 2.2.25, 2.2.28, and 2.2.4.
CVE-2013-2742 is a persistence vulnerability that allows a script to remain accessible after its intended use.
Yes, CVE-2013-2742 can allow remote attackers to gain unauthorized access to the affected system.