Description
WordPress Plugin BackUpWordPress is prone to a remote file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system. WordPress Plugin BackUpWordPress versions 0.4.2b and below are vulnerable.
Remediation
Update to plugin version 1.0 or latest
References
http://www.exploit-db.com/exploits/4593/
http://packetstormsecurity.com/files/view/60611/backupword-rfi.txt
Related Vulnerabilities
Joomla Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-26034)
WordPress Plugin Backup Migration Information Disclosure (1.2.8)
WebLogic Observable Discrepancy Vulnerability (CVE-2019-3739)
Apache HTTP Server Insertion of Sensitive Information into Log File Vulnerability (CVE-2001-1556)
WordPress Plugin BuddyPress Multiple Cross-Site Request Forgery Vulnerabilities (2.8.1)