Freshmail for WordPress <= 1.5.8 - shortcode.php SQL Injection



Description
There is a SQL Injection vulnerability available for collaborators (or higher privileged users) for webs with freshmail plugin installed. The SQL Injection is located in the attribute "id" of the inserted shortcode [FM_form id="N"]. The shortcode attribute "id" is not sanitized before inserting it in a SQL query.
 
A collaborator can insert shortcodes when he/she is editing a new post or
page and can preview the results (no administrator approval needed),
launching this SQL Injection.
Proof of Concept
1. As collaborator, start a new post.
2. Insert the shortcode [FM_form id='1" and substr(user(),1,1)="b']
3. Click preview.
4. If the form is shown, the statement is true, if not, false.

Affects Plugin

fixed in version 1.6

References

CVE 2015-9496
EXPLOITDB 36942

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Felipe Molina
Submitter Twitter felmoltor
Views 5986
Verified No
WPVDB ID 7972

Timeline

Publicly Published 2015-05-06 (over 4 years ago)
Added 2015-05-08 (over 4 years ago)
Last Updated 2019-11-28 (18 days ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin