SB2019042404 - Multiple vulnerabilities in WP Database Backup plugin for WordPress



SB2019042404 - Multiple vulnerabilities in WP Database Backup plugin for WordPress

Published: April 24, 2019 Updated: June 18, 2019

Security Bulletin ID SB2019042404
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper access control (CVE-ID: N/A)

The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.

The vulnerability exists due to improper access restrictions when a nonce check was required when the "wp-database-backup" page of a site’s admin dashboard was accessed. A remote attacker can modify backup configuration settings, including list tables that are to be excluded from the backup.


2) OS Command Injection (CVE-ID: N/A)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when processing data passed via the "$wp_db_exclude_table" variable in mysqldump function when creating a command to execute the database dump  A remote authenticated attacker (but see vulnerability #1) can inject arbitrary OS commands, which are then executed when the plugin performs a database backup.

Chained exploitation of these two vulnerabilities may allow a remote non-authenticated attacker to execute arbitrary code on the target system.



Remediation

Install update from vendor's website.