Lucene search

K
attackerkbAttackerKBAKB:4E9D15C5-C14D-4D5D-B9E3-436A099F36B9
HistoryMay 08, 2020 - 12:00 a.m.

CVE-2020-11530

2020-05-0800:00:00
attackerkb.com
12

EPSS

0.788

Percentile

98.3%

A blind SQL injection vulnerability is present in Chop Slider 3, a WordPress plugin. The vulnerability is introduced in the id GET parameter supplied to get_script/index.php, and allows an attacker to execute arbitrary SQL queries in the context of the WP database user.

Recent assessments:

h00die at January 18, 2021 3:04pm UTC reported:

Blind SQLi in Chop Slider 3 by iDangero.us. The true value of this exploit is low, simply because the company stopped supporting the plugin several years before the exploit was discovered. Most users had therefore moved away from the plug-in before disclosure.

The iDangero.us Chop Slider 3 WordPress plugin prior to version 3.4 contains a blind SQL injection in the id parameter of the get_sript/index.php page. The injection is passed through GET parameters, and thus must be encoded, and magic_quotes is applied at the server.

Exploitable in default config, a valid id is not required.

<https://github.com/rapid7/metasploit-framework/pull/14576&gt;

Assessed Attacker Value: 1
Assessed Attacker Value: 1Assessed Attacker Value: 4