DukaPress <= 2.5.9 - Unauthenticated Blind SQL InjectionSign up to our free email alerts service for instant vulnerability notifications!
The code in dukapress/download.php does not sanitize user input from $_GET['id'] before passing it to query() allowing SQL to be injected. The user is not required to be logged into WordPress in order to exploit this vulnerability.
fixed in version 220.127.116.11
|OWASP Top 10||A1: Injection|
|Submitter||Larry W. Cashdollar|
|Publicly Published||2015-08-22 (about 2 years ago)|
|Added||2015-08-22 (about 2 years ago)|
|Last Updated||2015-08-22 (about 2 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|