An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of "wp_ajax_nopriv" call in WordPress, which allows any unauthenticated user to get access to the function "gdlr_lms_cancel_booking" where POST Parameter "id" was sent straight into SQL query without sanitization.
References
Link | Resource |
---|---|
https://gist.github.com/0xx7/a7aaa8b0515139cf7e30c808c8d54070 | Exploit Third Party Advisory |
https://gist.github.com/0xx7/a7aaa8b0515139cf7e30c808c8d54070 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/0xx7/a7aaa8b0515139cf7e30c808c8d54070 - Exploit, Third Party Advisory |
Information
Published : 2020-11-12 14:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27481
Mitre link : CVE-2020-27481
CVE.ORG link : CVE-2020-27481
JSON object : View
Products Affected
goodlayers
- good_learning_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')