WordPress Plugin Vulnerabilities

Active Directory Integration <= 1.1.8 - Authenticated SQL Injection

Description

Type user acces: administrator user.
Target need have configured ldap and active.

Path Request: /wp-content/plugins/active-directory-integration/syncback.php

Line : 135
$result = $ADI->bulksyncback( $_GET['userid'] );

$_GET[‘userid’] is not escaped.

Path Method: /wp-content/plugins/active-directory-integration/BulkSyncBackADIntegrationPlugin.class.php

Line: 142
$wpdb->get_results("SELECT user_id FROM $wpdb->usermeta WHERE meta_key = 'adi_samaccountname' AND meta_value <> '' AND user_id <> 1 AND user_id = $userid");

Proof of Concept

Affects Plugins

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No

Timeline

Publicly Published
2017-11-03 (about 8 years ago)
Added
2017-11-12 (about 8 years ago)
Last Updated
2019-11-01 (about 6 years ago)

Other