WordPress Plugin Vulnerabilities

EZ SQL Reports < 4.11.37 - Authenticated Arbitrary Code Execution

Description

There are several calls to "passtthru" in the code, one of them is receiving the username, password, database name and host from the $_POST arguments, so you can inject in every of this parameter the ";" character or others like "&&" or "||" to execute other distinct commands to "/usr/bin/mysql".

Proof of Concept

Affects Plugins

Fixed in 4.11.37

References

Exploitdb

Classification

Type
RCE
OWASP top 10
CWE

Miscellaneous

Submitter
Felipe Moline
Submitter twitter
Verified
No

Timeline

Publicly Published
2015-09-14 (about 10 years ago)
Added
2015-09-15 (about 10 years ago)
Last Updated
2019-10-29 (about 6 years ago)

Other