.. / CVE-2022-31474

Exploit for BackupBuddy - Local File Inclusion (CVE-2022-31474)

Description:

BackupBuddy versions 8.5.8.0 - 8.7.4.1 are vulnerable to a local file inclusion vulnerability via the ‘download’ and ‘local-destination-id’ parameters.

Nuclei Template

View the template here CVE-2022-31474.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-31474.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2022-31474
https://ithemes.com/blog/wordpress-vulnerability-report-special-edition-september-6-2022-backupbuddy
https://www.wordfence.com/blog/2022/09/psa-nearly-5-million-attacks-blocked-targeting-0-day-in-backupbuddy-plugin/
https://ithemes.com/backupbuddy/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31474
https://ithemes.com/blog/wordpress-vulnerability-report-special-edition-september-6-2022-backupbuddy/