SQL injection vulnerability in the "the_search_function" function in cardoza_ajax_search.php in the AJAX Post Search (cardoza-ajax-search) plugin before 1.3 for WordPress allows remote attackers to execute arbitrary SQL commands via the srch_txt parameter in a "the_search_text" action to wp-admin/admin-ajax.php.
References
Link | Resource |
---|---|
http://seclists.org/bugtraq/2012/Nov/33 | Exploit Mailing List Third Party Advisory |
https://wordpress.org/plugins/cardoza-ajax-search/changelog/ | Third Party Advisory |
http://seclists.org/bugtraq/2012/Nov/33 | Exploit Mailing List Third Party Advisory |
https://wordpress.org/plugins/cardoza-ajax-search/changelog/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/bugtraq/2012/Nov/33 - Exploit, Mailing List, Third Party Advisory | |
References | () https://wordpress.org/plugins/cardoza-ajax-search/changelog/ - Third Party Advisory |
Information
Published : 2015-01-08 01:59
Updated : 2024-11-21 01:45
NVD link : CVE-2012-5853
Mitre link : CVE-2012-5853
CVE.ORG link : CVE-2012-5853
JSON object : View
Products Affected
ajax_search_project
- ajax_search
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')