WordPress Plugin Vulnerabilities
EZ SQL Reports < 4.11.37 - Authenticated Arbitrary Code Execution
Description
There are several calls to "passtthru" in the code, one of them is receiving the username, password, database name and host from the $_POST arguments, so you can inject in every of this parameter the ";" character or others like "&&" or "||" to execute other distinct commands to "/usr/bin/mysql".
Proof of Concept
Affects Plugins
References
Exploitdb
Classification
Type
RCE
OWASP top 10
CWE
Miscellaneous
Submitter
Felipe Moline
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2015-09-14 (about 10 years ago)
Added
2015-09-15 (about 10 years ago)
Last Updated
2019-10-29 (about 6 years ago)