Vigil@nce - WordPress WP-Testimonials: SQL injection via the testid request parameter
August 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use a SQL injection via the request parameter
testid in WordPress WP-Testimonials, in order to read or alter
data.
Impacted products: WordPress Plugins not comprehensive.
Severity: 2/4.
Creation date: 13/06/2017.
DESCRIPTION OF THE VULNERABILITY
The WordPress WP-Testimonials product uses a database.
However, user’s data are directly inserted in a SQL query.
An attacker can therefore use a SQL injection via the request
parameter testid in WordPress WP-Testimonials, in order to read or
alter data.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN