Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "WordPress Total Upkeep Database and Files Backup Download" module is a test case designed to detect vulnerabilities in the WordPress Total Upkeep plugin. It focuses on the functionality that allows users to download backups of their database and files. This module has a high severity level, indicating that it targets a potentially significant security issue. The original author of this module is princechaddha.
If a vulnerability is detected using this module, an attacker may be able to exploit it to gain unauthorized access to the backup files and potentially sensitive data stored within them. This could lead to data breaches, unauthorized modifications, or other malicious activities.
The module works by sending an HTTP GET request to the "/wp-content/plugins/boldgrid-backup/cron/restore-info.json" endpoint of the WordPress Total Upkeep plugin. It then applies a series of matching conditions to determine if the response indicates a vulnerability.
Matching conditions:
- The response header must contain the word "application/json". - The response body must contain the words "\"filepath\"" and "/wp-content/boldgrid_backup_". - The HTTP status code must be 200.If all of these conditions are met, the module reports a vulnerability.
Example HTTP request:
GET /wp-content/plugins/boldgrid-backup/cron/restore-info.json
Note: The above example is a simplified representation of the HTTP request and does not include headers or other details.
This module is part of the Vidoc platform, which utilizes multiple modules to perform scanning and identify potential security issues in WordPress installations.