PHP remote file inclusion vulnerability in wp_xml_export.php in the BackWPup plugin before 1.7.2 for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the wpabs parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://wordpress.org/support/topic/plugin-backwpup-remote-and-local-codeexecution-vulnerability-sos-11-003 | |
http://www.osvdb.org/71481 | vdb entry exploit |
http://www.exploit-db.com/exploits/17056 | exploit |
http://www.senseofsecurity.com.au/advisories/SOS-11-003.pdf | exploit url repurposed |
http://seclists.org/fulldisclosure/2011/Mar/328 | exploit mailing list |
http://secunia.com/advisories/43565 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2011/11/22/10 | exploit mailing list |
http://www.openwall.com/lists/oss-security/2011/11/22/7 | exploit mailing list |
http://packetstormsecurity.org/files/view/99799/SOS-11-003.txt | exploit |