WordPress Plugin Vulnerabilities
Active Directory Integration <= 1.1.8 - Authenticated SQL Injection
Description
Type user acces: administrator user.
Target need have configured ldap and active.
Path Request: /wp-content/plugins/active-directory-integration/syncback.php
Line : 135
$result = $ADI->bulksyncback( $_GET['userid'] );
$_GET[‘userid’] is not escaped.
Path Method: /wp-content/plugins/active-directory-integration/BulkSyncBackADIntegrationPlugin.class.php
Line: 142
$wpdb->get_results("SELECT user_id FROM $wpdb->usermeta WHERE meta_key = 'adi_samaccountname' AND meta_value <> '' AND user_id <> 1 AND user_id = $userid");
Proof of Concept
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
Miscellaneous
Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2017-11-03 (about 8 years ago)
Added
2017-11-12 (about 8 years ago)
Last Updated
2019-11-01 (about 6 years ago)