Summary
This host is installed with WordPress Multi
View Event Calendar plugin and is prone to sql-injection vulnerability.
Impact
Successful exploitation will allow attacker to
manipulate SQL queries in the backend database allowing for the manipulation or disclosure of arbitrary data.
Impact Level: Application
Solution
No solution or patch is available as of 9th
February, 2015. Information regarding this issue will be updated once the solution details are available. For updates refer to
https://wordpress.org/plugins/cp-multi-view-calendar/
Insight
Input passed via the 'calid' GET parameter
is not properly sanitized before being returned to the user.
Affected
CP Multi View Event Calendar version 1.01
Detection
Send a crafted data via HTTP GET request
and check whether it is able to execute sql query or not.
References
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Ad Manager Pro Multiple SQL Injection And XSS Vulnerabilities
- AdaptBB Multiple Input Validation Vulnerabilities
- Advantech Studio 'NTWebServer.exe' Directory Traversal Vulnerability
- Apache Tomcat AJP Protocol Security Bypass Vulnerability
- AlienVault OSSIM 'date_from' Parameter Multiple SQL Injection Vulnerabilities