WordPress Plugin Vulnerabilities
GeoDirectory Location Manager < 2.1.0.10 - Multiple Unauthenticated SQL Injections
Description
In the plugin, the AJAX action gd_popular_location_list did not properly sanitise or validate some of its POST parameters, which are then used in a SQL statement, leading to unauthenticated SQL Injection issues.
The prerequisite to exploiting this vulnerability is finding a page on the vulnerable site which uses affected functionality. Even if the site uses the affected plugin, it has to include the file `/wp-content/plugins/geodir_location_manager/includes/widget-functions.php` which includes that action in the site. That page creates a `_nonce` variable which is validated by the script to be a valid one. In the time of writing. I did not find a way to bypass that check.
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Rafal Goryl
Submitter
Rafal Goryl
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-06-04 (about 4 years ago)
Added
2021-06-04 (about 4 years ago)
Last Updated
2021-06-25 (about 4 years ago)