CVE-2014-2579

N/A Unknown
Published: April 25, 2014 Modified: May 06, 2026
View on NVD

Description

Multiple cross-site request forgery (CSRF) vulnerabilities in XCloner Standalone 3.5 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrator password via the config task to index2.php or (2) when the enable_db_backup and sql_mem options are enabled, access the database backup functionality via the dbbackup_comp parameter in the generate action to index2.php. NOTE: vector 2 might be a duplicate of CVE-2014-2340, which is for the XCloner Wordpress plugin. NOTE: remote attackers can leverage CVE-2014-2996 with vector 2 to execute arbitrary commands.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.exploit-db.com/exploits/32790
Source: cve@mitre.org
Exploit
https://www.htbridge.com/advisory/HTB23207
Source: cve@mitre.org
Exploit
http://www.exploit-db.com/exploits/32790
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/archive/1/531780/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/66751
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.htbridge.com/advisory/HTB23207
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.3%
80th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

xcloner