漏洞标题
WP Project Manager <= 2.6.17 - 经认证的 (订阅者+) 通过orderby参数进行SQL注入
漏洞描述信息
WordPress插件WP Project Manager – Task, team, and project management(版本2.6.17及之前版本)中的'orderby'参数存在时间型SQL注入漏洞。由于用户提供的参数过滤不足以及现有SQL查询准备不充分,允许具有订阅者级别及以上访问权限的认证攻击者在已存在的查询中附加额外的SQL查询,从而获取数据库中的敏感信息。
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
WP Project Manager <= 2.6.17 - Authenticated (Subscriber+) SQL Injection via orderby Parameter
漏洞描述信息
The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 2.6.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)