WordPress Lead Octopus Power 'id' Parameter SQL Injection Vulnerability

2014-07-28T00:00:00
ID EDB-ID:39269
Type exploitdb
Reporter Amirh03in
Modified 2014-07-28T00:00:00

Description

WordPress Lead Octopus Power 'id' Parameter SQL Injection Vulnerability. CVE-2014-5189. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/68934/info

The Lead Octopus Power plugin for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 

http://www.example.com/wp-content/plugins/Lead-Octopus-Power/lib/optin/optin_page.php?id=[SQL]