6.5
CVSSv2

CVE-2014-8603

Published: 10/06/2015 Updated: 11/06/2015
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

cloner.functions.php in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to execute arbitrary code via shell metacharacters in the (1) file name when creating a backup or vectors related to the (2) $_CONFIG[tarpath], (3) $exclude, (4) $_CONFIG['tarcompress'], (5) $_CONFIG['filename'], (6) $_CONFIG['exfile_tar'], (7) $_CONFIG[sqldump], (8) $_CONFIG['mysql_host'], (9) $_CONFIG['mysql_pass'], (10) $_CONFIG['mysql_user'], (11) $database_name, or (12) $sqlfile variable.

Vulnerable Product Search on Vulmon Subscribe to Product

xcloner xcloner 3.5.1

xcloner xcloner 3.1.1

Exploits

Title: XCloner Wordpress/Joomla! backup Plugin v311 (Wordpress) v351 (Joomla!) Vulnerabilities Author: Larry W Cashdollar, @_larry0 Date: 10/17/2014 Download: wordpressorg/plugins/xcloner-backup-and-restore/ Download: extensionsjoomlaorg/extensions/access-a-security/site-security/backup/665 Downloads: Wordpress 313,647 Joomla ...