Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cppw-2fwh-6pqg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.

The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.

EPSS

Процентиль: 70%
0.0062
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 7.2
nvd
больше 4 лет назад

The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.

EPSS

Процентиль: 70%
0.0062
Низкий

Дефекты

CWE-89