Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

WordPress Total Upkeep Database and Files Backup Download

By kannthu

High
Vidoc logoVidoc Module
#wordpress#wp-plugin#edb
Description

What is the "WordPress Total Upkeep Database and Files Backup Download" module?

The "WordPress Total Upkeep Database and Files Backup Download" module is a test case designed to detect vulnerabilities in the WordPress Total Upkeep plugin. It focuses on the functionality that allows users to download backups of their database and files. This module has a high severity level, indicating that it targets a potentially significant security issue. The original author of this module is princechaddha.

Impact

If a vulnerability is detected using this module, an attacker may be able to exploit it to gain unauthorized access to the backup files and potentially sensitive data stored within them. This could lead to data breaches, unauthorized modifications, or other malicious activities.

How does the module work?

The module works by sending an HTTP GET request to the "/wp-content/plugins/boldgrid-backup/cron/restore-info.json" endpoint of the WordPress Total Upkeep plugin. It then applies a series of matching conditions to determine if the response indicates a vulnerability.

Matching conditions:

- The response header must contain the word "application/json". - The response body must contain the words "\"filepath\"" and "/wp-content/boldgrid_backup_". - The HTTP status code must be 200.

If all of these conditions are met, the module reports a vulnerability.

Example HTTP request:

GET /wp-content/plugins/boldgrid-backup/cron/restore-info.json

Note: The above example is a simplified representation of the HTTP request and does not include headers or other details.

This module is part of the Vidoc platform, which utilizes multiple modules to perform scanning and identify potential security issues in WordPress installations.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/wp-content/plugins/...
Matching conditions
word: application/jsonand
word: "filepath", /wp-content/boldgrid_backup_and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability