WordPress Appointment Booking Calendar 1.1.7 SQL Injection

2015.09.29
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Vulnerability title: SQL Injection in Appointment Booking Calendar 1.1.7 WordPress plugin CVE: CVE-2015-7319 Vendor: WordPress DWBooster Product: Appointment Booking Calendar Affected version: 1.1.7 Fixed version: 1.1.8 Reported by: Ibéria Medeiros Vulnerability Details: ===================== It was discovered that no protection against SQL injection attack was implemented, resulting in an attacker being able to update the username, gaining access with the new user. The Appointment Booking Calendar 1.1.7 WordPress plugin is vulnerable to a SLI injection (SQLI) vulnerability. A SQLI vector was identified in cpabc_appointments_admin_int_calendar_list.inc.php System affected: =============== Any system that access to a web site developed by WordPress CMS version 4.3.1 or higher and uses the Appointment Booking Calendar plugin v.1.1.7 or early. Solution: ======== Update to Appointment Booking Calendar 1.1.8 plugin Disclosure Timeline: =================== Vendor Notification: September 22, 2015 Vendor fixed vulnerability: September 22, 2015 Public Disclosure: September 26, 2015


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top