Membership is FREE – with unlimited access to all features, tools, and discussions. Premium accounts get benefits like banner ads and newsletter exposure. ✅ Signature links are now free for all. 🚫 No AI-generated (LLM) posts allowed. Share your own thoughts and experience — accounts may be terminated for violations.

BackupBuddy vulnerability

Status
Not open for further replies.

AdminAdmin is verified member.

Administrator
Acorn Staff
Nominet Registrar
Joined
Jun 14, 2004
Posts
11,108
Reaction score
988
BackupBuddy vulnerability

A vulnerability has been found in the popular BackupBuddy plugin and was made public 24 hours ago. As part of the restore process of BackupBuddy, the script is supposed to remove a file called 'importbuddy.php' which is usually in the root of your WordPress installation. This step occasionally fails as a result of filesystem permissions.

What to do: If you use BackupBuddy to restore your data from a backup, make sure that you manually check that importbuddy.php has been deleted from your WordPress root directory once you have completed the restore process.

If importbuddy.php does fail to get deleted, an attacker can use importbuddy.php to find out the names of your backup files and download them. These backup files contain your site's files and your database. importbuddy.php also includes an upload option which may be abused for site modification or defacement.

Note that importbuddy.php does have a password option but according to the researcher who reported this issue the password is not a mandatory requirement.
 
Status
Not open for further replies.
General chit-chat
Help Users
  • No one is chatting at the moment.
      Helmuts @ HelmutsHelmuts is verified member.: Good morning all
      Top Bottom