Vulnerability CVE-2018-3811


Published: 2018-01-01

Description:
SQL Injection vulnerability in the Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to execute SQL queries in the context of the web server. The saveGoogleAdWords() function in smartgooglecode.php did not use prepared statements and did not sanitize the $_POST["oId"] variable before passing it as input into the SQL query.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
WordPress Plugin Smart Google Code Inserter < 3.5 Authentication Bypass / SQL Injection
Benjamin Lim
03.01.2018
Med.
WordPress Smart Google Code Inserter SQL Injection
Benjamin Lim
04.01.2018

Type:

CWE-89

(Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
https://limbenjamin.com/articles/smart-google-code-inserter-auth-bypass.html
https://wordpress.org/plugins/smart-google-code-inserter/#developers
https://wpvulndb.com/vulnerabilities/8988
https://www.exploit-db.com/exploits/43420/

Copyright 2024, cxsecurity.com

 

Back to Top