WordPress Plugin Vulnerabilities

SEO Booster < 3.8 - Admin+ SQL Injection

Description

The plugin allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections.

Proof of Concept

Affects Plugins

Fixed in 3.8

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
bl4derunner
Submitter
Anton Sarsadskikh
Verified
Yes

Timeline

Publicly Published
2021-11-15 (about 4 years ago)
Added
2021-11-15 (about 4 years ago)
Last Updated
2022-04-11 (about 3 years ago)

Other