Answer My Question 1.3 - SQL Injection
Description | $_POST['id'] is not escaped. Url is accessible for any user. Url vulnerable : http://target/wp-content/plugins/answer-my-question/modal.php |
Proof of Concept |
|
Affects Plugin
References
EXPLOITDB | 40771 |
URL | http://lenonleite.com.br/en/blog/2016/11/11/answer-my-question-1-3-plugin-for-wordpress-sql-injection/ |
Classification
Type | SQLI |
OWASP Top 10 | A1: Injection |
CWE | CWE-89 |
Miscellaneous
Submitter | Lenon Leite |
Submitter Website | http://lenonleite.com.br/en/ |
Submitter Twitter | lenonleite |
Views | 4146 |
Verified | No |
WPVDB ID | 8669 |
Timeline
Publicly Published | 2016-11-17 (about 3 years ago) |
Added | 2016-11-21 (about 3 years ago) |
Last Updated | 2019-11-01 (about 1 month ago) |
Our Other Services
Online WordPress Vulnerability Scanner | WPScan WordPress Security Plugin |