Lucene search

K
wpvulndbFelipe MolinaWPVDB-ID:89BE1E1A-937D-48DB-91AC-2B8D9F417675
HistoryMay 06, 2015 - 12:00 a.m.

Freshmail for WordPress <= 1.5.8 - shortcode.php SQL Injection

2015-05-0600:00:00
Felipe Molina
wpscan.com
8

0.002 Low

EPSS

Percentile

57.3%

There is a SQL Injection vulnerability available for collaborators (or higher privileged users) for webs with freshmail plugin installed. The SQL Injection is located in the attribute “id” of the inserted shortcode [FM_form id=“N”]. The shortcode attribute “id” is not sanitized before inserting it in a SQL query. A collaborator can insert shortcodes when he/she is editing a new post or page and can preview the results (no administrator approval needed), launching this SQL Injection.

PoC

1. As collaborator, start a new post. 2. Insert the shortcode [FM_form id=‘1" and substr(user(),1,1)="b’] 3. Click preview. 4. If the form is shown, the statement is true, if not, false.

CPENameOperatorVersion
freshmail-newsletterlt1.6

0.002 Low

EPSS

Percentile

57.3%

Related for WPVDB-ID:89BE1E1A-937D-48DB-91AC-2B8D9F417675