Freshmail for WordPress <= 1.5.8 - shortcode.php SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
There is a SQL Injection vulnerability available for collaborators (or higher privileged users) for webs with freshmail plugin installed. The SQL Injection is located in the attribute "id" of the inserted shortcode [FM_form id="N"]. The shortcode attribute "id" is not sanitized before inserting it in a SQL query.
 
A collaborator can insert shortcodes when he/she is editing a new post or
page and can preview the results (no administrator approval needed),
launching this SQL Injection.
Proof of Concept
1. As collaborator, start a new post.
2. Insert the shortcode [FM_form id='1" and substr(user(),1,1)="b']
3. Click preview.
4. If the form is shown, the statement is true, if not, false.

Affects Plugin

fixed in version 1.6

References

EXPLOITDB 36942

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Felipe Molina
Submitter Twitter felmoltor
Views 135
Verified No
WPVDB ID 7972

Timeline

Publicly Published 2015-05-06 (over 2 years ago)
Added 2015-05-08 (over 2 years ago)
Last Updated 2015-05-15 (over 2 years ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.