#VU46973 Improper access control in XCloner - Backup and Restore
Published: September 23, 2020
XCloner - Backup and Restore
Liuta Ovidiu
Description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in multiple AJAX actions. A remote authenticated attacker can bypass implemented security restrictions and perform arbitrary actions, such as overwrite arbitrary files and disclose sensitive information on the system.