Multiple SQL injection vulnerabilities in the All In One WP Security & Firewall plugin before 3.8.3 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) orderby or (2) order parameter in the aiowpsec page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/128419/All-In-One-WP-Security-3.8.2-SQL-Injection.html - Exploit | |
References | () http://www.exploit-db.com/exploits/34781 - Exploit | |
References | () http://www.securityfocus.com/archive/1/533519/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/70150 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/96204 - | |
References | () https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/changelog - Vendor Advisory | |
References | () https://www.htbridge.com/advisory/HTB23231 - Exploit |
Information
Published : 2014-10-02 14:55
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6242
Mitre link : CVE-2014-6242
CVE.ORG link : CVE-2014-6242
JSON object : View
Products Affected
tips_and_tricks_hq
- all_in_one_wordpress_security_and_firewall
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')