Is I am wondering if these elements only apply to those using the database backup functionality. These attacks look as though they require a certain configuration.
My question is, is this something that is a general security hole. The report does not declare any details on what circumstances allow for the acts to be successful. Yes there may be a security hole here but is it necessarily an item that can be easily exploited if all other security elements are in place?
Again, I don’t know but those are my questions as a web developer. And overreacting is not usually the best response.