Description
Supsystic Backup 2.3.9 contains a local file inclusion vulnerability that allows unauthenticated attackers to read and delete arbitrary files by manipulating the download path parameter. Attackers can modify the download parameter in admin.php requests with directory traversal sequences to access sensitive files like /etc/passwd or delete files via the removeAction parameter.
Problem types
Product status
Credits
Erik David Martin
References
www.exploit-db.com/exploits/49545 (ExploitDB-49545)
supsystic.com/ (Official Product Homepage)
downloads.wordpress.org/plugin/backup-by-supsystic.zip (Product Reference)
www.vulncheck.com/...n-supsystic-backup-local-file-inclusion (VulnCheck Advisory: WordPress Plugin Supsystic Backup 2.3.9 Local File Inclusion)