SQL injection vulnerability in adrotate/adrotate-out.php in the AdRotate plugin 3.6.6, and other versions before 3.6.8, for WordPress allows remote attackers to execute arbitrary SQL commands via the track parameter (aka redirect URL).
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.wordpress.org/plugin/adrotate.3.6.8.zip - Patch | |
References | () http://secunia.com/advisories/46814 - | |
References | () http://unconciousmind.blogspot.com/2011/11/wordpress-adrotate-plugin-366-sql.html - Exploit | |
References | () http://www.exploit-db.com/exploits/18114 - Exploit | |
References | () http://www.securityfocus.com/bid/50674 - |
Information
Published : 2011-12-02 18:55
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4671
Mitre link : CVE-2011-4671
CVE.ORG link : CVE-2011-4671
JSON object : View
Products Affected
adrotateplugin
- adrotate
wordpress
- wordpress
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')