Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xg34-xq74-8f84

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.

The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.

EPSS

Процентиль: 68%
0.00582
Низкий

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.

EPSS

Процентиль: 68%
0.00582
Низкий

Дефекты

CWE-89