The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2637115 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/40849d93-8949-4bd0-b60e-c0330b385fea | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2637115 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/40849d93-8949-4bd0-b60e-c0330b385fea | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/2637115 - Patch, Third Party Advisory | |
References | () https://wpscan.com/vulnerability/40849d93-8949-4bd0-b60e-c0330b385fea - Exploit, Third Party Advisory |
Information
Published : 2021-12-13 11:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24747
Mitre link : CVE-2021-24747
CVE.ORG link : CVE-2021-24747
JSON object : View
Products Affected
cleverplugins
- seo_booster
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')