Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! provides the MySQL username and password on the command line, which allows local users to obtain sensitive information via the ps command.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
WordPress Xcloner插件和Joomla! Xcloner插件信息泄露漏洞
Vulnerability Description
WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Joomla!是美国Open Source Matters团队开发的一套开源的内容管理系统(CMS)。XCloner是其中的一个用于备份和恢复数据及数据库的插件。 WordPress Xcloner插件3.1.1版本和Joomla! Xcloner插件3.5.1版本中存在安全漏洞,该漏洞源于程序在命令行中显示MySQL用户名和密码。本地攻击者可借助ps命令利用该漏洞
CVSS Information
N/A
Vulnerability Type
N/A