Live Forms - Visual Form Builder 3.0.1 - Blind SQL InjectionSign up to our free email alerts service for instant vulnerability notifications!
The AJAX action ‘get_reqlist’ is available to all logged in users. The parameter ‘ipp’ sent to this action is vulnerable to Blind MySQL Injection. This can be leveraged by detecting how long a query takes to return.
fixed in version 3.2.0
|OWASP Top 10||A1: Injection|
|Publicly Published||2015-03-18 (about 3 years ago)|
|Added||2015-03-18 (about 3 years ago)|
|Last Updated||2015-05-15 (about 3 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|