一、 漏洞 CVE-2024-13910 基础信息
漏洞标题
Database Backup and check Tables Automated With Scheduler 2.36及以下版本存在认证(管理员+)任意文件删除漏洞
来源:AIGC 神龙大模型
漏洞描述信息
WordPress插件Database Backup and check Tables Automated With Scheduler 2024在所有版本(包括2.35)中存在任意文件删除漏洞。该漏洞是由于在'database_backup_ajax_delete'函数中对文件路径的验证不足导致的。这使得具有管理员级别及以上权限的经过身份验证的攻击者能够在服务器上删除任意文件。当删除特定文件(如wp-config.php)时,这可能会导致远程代码执行。该漏洞在2.36版本中部分修复。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
对路径名的限制不恰当(路径遍历)
来源:AIGC 神龙大模型
漏洞标题
Database Backup and check Tables Automated With Scheduler 2024 <= 2.36 - Authenticated (Administrator+) Arbitrary File Deletion
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The Database Backup and check Tables Automated With Scheduler 2024 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'database_backup_ajax_delete' function in all versions up to, and including, 2.35. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability was partially patched in version 2.36.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
对路径名的限制不恰当(路径遍历)
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2024-13910 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2024-13910 的情报信息