WordPress Plugin Vulnerabilities

Video List Manager <= 1.7 - Admin+ SQL Injection

Description

The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin

Proof of Concept

SELECT query:

1. Log in as admin.
2. Visit the following path on the site: `/wp-admin/admin.php?page=tnt_video_edit_page&videoID=SLEEP%285%29`
3. The browser will take 5 seconds to respond.

DELETE query:

1. Log in as admin.
2. Visit the following path on the site: `/wp-admin/admin.php?page=tnt_video_del_page&videoID=SLEEP%285%29`
3. Click the "Yes" button.
4. The browser will take 5 seconds to respond.

Affects Plugins

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
zhangyunpei and Yeting Li VARAS@IIE
Submitter
zhangyunpei
Verified
Yes

Timeline

Publicly Published
2023-04-17 (about 1 years ago)
Added
2023-04-17 (about 1 years ago)
Last Updated
2023-04-17 (about 1 years ago)

Other