You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module exploits an unauth RCE in the WordPress plugin: Backup Migration (<= 1.3.7). The vulnerability is\n exploitable through the Content-Dir header which is sent to the /wp-content/plugins/backup-backup/includes/backup-heart.php endpoint.\n\n The exploit makes use of a neat technique called PHP Filter Chaining which allows an attacker to prepend\n bytes to a string by continuously chaining character encoding conversions. This allows an attacker to prepend\n a PHP payload to a string which gets evaluated by a require statement, which results in command execution.",
0 commit comments