Backuply Vulnerability– Backup, Restore, Migrate and Clone – Authenticated (Administrator+) Directory Traversal – CVE-2024-0697 |WordPress Plugin Vulnerability Report 

Plugin Name: Backuply – Backup, Restore, Migrate and Clone

Key Information:

  • Software Type: Plugin
  • Software Slug: backuply
  • Software Status: Active
  • Software Author: Softaculous
  • Software Downloads: 1,893,554
  • Active Installs: 200,000
  • Last Updated: February 1, 2024
  • Patched Versions: 1.2.4
  • Affected Versions: <= 1.2.3

Vulnerability Details:

  • Name: Backuply – Backup, Restore, Migrate and Clone <= 1.2.3
  • Title: Authenticated (Administrator+) Directory Traversal
  • Type: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  • CVE: CVE-2024-0697
  • CVSS Score: 6.5
  • Publicly Published: January 26, 2024
  • Researcher: Bence Szalai
  • Description: The Backuply plugin is exposed to a Directory Traversal vulnerability in versions up to 1.2.3, specifically through the node_id parameter in the backuply_get_jstree function. This vulnerability allows users with administrator-level access to read arbitrary files on the server, potentially accessing sensitive information.

Summary:

Backuply, a popular WordPress plugin designed for backing up, restoring, migrating, and cloning websites, has been identified with a significant security vulnerability in versions up to and including 1.2.3. This flaw, categorized as Directory Traversal, could potentially compromise server security by allowing unauthorized access to sensitive files. The vulnerability has been addressed in the newly released version 1.2.4.

Detailed Overview:

Discovered by cybersecurity researcher Bence Szalai, this vulnerability highlights a critical oversight in the plugin's security measures, particularly in how it handles file paths. By exploiting the Directory Traversal vulnerability, attackers with administrative privileges can navigate beyond intended directories to access files elsewhere on the server, posing a significant risk to the confidentiality and integrity of the stored data.

Advice for Users:

  • Immediate Action: Users of the Backuply plugin are advised to update to version 1.2.4 immediately, which contains the necessary fixes for this vulnerability. Delaying this update could leave your site exposed to potential data breaches.
  • Check for Signs of Vulnerability: Administrators should review server logs and WordPress activity logs for any unusual or unauthorized access patterns that might indicate exploitation of this vulnerability.
  • Alternate Plugins: While the patched version is deemed secure, users may consider exploring alternative backup solutions to diversify their security measures.
  • Stay Updated: It is crucial to keep all WordPress plugins, themes, and core software updated to their latest versions to protect against known vulnerabilities and ensure ongoing site security.

Conclusion:

The swift resolution of the Directory Traversal vulnerability in Backuply – Backup, Restore, Migrate and Clone by Softaculous underscores the ongoing importance of vigilance in the digital landscape. This incident serves as a reminder for WordPress site owners and administrators about the critical need for regular updates and proactive security practices. By ensuring that your plugins are up-to-date and adhering to security best practices, you can significantly bolster your site's defenses against potential vulnerabilities and maintain a secure environment for your users.

References:

In the digital realm, where websites serve as the lifeblood of countless businesses, the integrity and security of every component, especially WordPress plugins, are paramount. The recent uncovering of a critical vulnerability in the "Backuply – Backup, Restore, Migrate and Clone" plugin, designated as CVE-2024-0697, casts a stark light on the ever-present need for vigilance in website maintenance. This Directory Traversal vulnerability not only poses a significant risk to data security but also emphasizes the importance of regular updates to safeguard digital assets.

About the Plugin: Backuply – Backup, Restore, Migrate and Clone

Backuply stands as a cornerstone for WordPress site administrators, offering robust solutions for data backup, restoration, migration, and cloning. With over 200,000 active installations and nearly 1.9 million downloads, its utility and popularity are undeniable. Developed by Softaculous, this plugin is integral for maintaining site continuity and protecting against data loss.

Vulnerability Details: CVE-2024-0697

Cybersecurity researcher Bence Szalai identified a Directory Traversal vulnerability in all versions of Backuply up to 1.2.3. This flaw, resulting from inadequate input sanitization in the backuply_get_jstree function, could allow attackers with administrator access to traverse directory paths and read sensitive files on the server. Publicly disclosed on January 26, 2024, this vulnerability has been assigned a CVSS score of 6.5, indicating a substantial security risk.

Risks and Potential Impacts

The exploitation of CVE-2024-0697 could lead to unauthorized access to critical data, compromising the confidentiality and integrity of information stored on the server. In the hands of a malicious actor, this vulnerability could result in significant data breaches, eroding trust and potentially leading to severe repercussions for businesses reliant on WordPress for their online presence.

Remediation and User Advice

To mitigate the risks associated with CVE-2024-0697, users are urged to update the Backuply plugin to version 1.2.4, where the vulnerability has been addressed. Site administrators should also conduct thorough audits for any unusual activity or unauthorized access, ensuring that their sites remain secure. Additionally, exploring alternative backup solutions can provide an added layer of security and redundancy.

Historical Context and Proactive Measures

This is not the first vulnerability reported for Backuply, with three previous vulnerabilities identified since December 14, 2022. This history underscores the importance of ongoing vigilance and the need for regular security assessments and updates.

Conclusion: The Imperative of Cybersecurity Vigilance

For small business owners, the task of staying updated with the latest security vulnerabilities can seem daunting. However, incidents like CVE-2024-0697 in the Backuply plugin underscore the critical importance of proactive security measures. Regularly updating plugins, employing robust security protocols, and staying informed about potential vulnerabilities are essential steps in fortifying your WordPress site against threats. In the digital age, where cybersecurity threats are ever-evolving, maintaining a secure online presence is not just a recommendation; it's a necessity for safeguarding your business and the trust of your users.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

Backuply Vulnerability– Backup, Restore, Migrate and Clone – Authenticated (Administrator+) Directory Traversal – CVE-2024-0697 |WordPress Plugin Vulnerability Report FAQs

What is CVE-2024-0697?

CVE-2024-0697 is a security vulnerability identifier for a Directory Traversal issue found in the Backuply – Backup, Restore, Migrate and Clone WordPress plugin. This vulnerability was discovered in versions up to 1.2.3 and allows users with administrator-level access to traverse the server's directories to read arbitrary files, which could contain sensitive information. The issue stems from insufficient input sanitization within the plugin's functionality.

Leave a Comment