Multiple SQL injection vulnerabilities in the Wysija Newsletters plugin before 2.2.1 for WordPress allow remote authenticated administrators to execute arbitrary SQL commands via the (1) search or (2) orderby parameter to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to execute arbitrary SQL commands.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2013-02/0030.html - Exploit | |
References | () http://osvdb.org/89924 - | |
References | () http://packetstormsecurity.com/files/120089/WordPress-Wysija-Newsletters-2.2-SQL-Injection.html - Exploit | |
References | () http://www.securityfocus.com/bid/57775 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/81932 - | |
References | () https://www.htbridge.com/advisory/HTB23140 - Exploit |
Information
Published : 2014-03-24 16:43
Updated : 2024-11-21 01:49
NVD link : CVE-2013-1408
Mitre link : CVE-2013-1408
CVE.ORG link : CVE-2013-1408
JSON object : View
Products Affected
wysija_newsletters_project
- wysija_newsletters
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')