Summary
This host is installed with WordPress Multi
View Event Calendar plugin and is prone to sql-injection vulnerability.
Impact
Successful exploitation will allow attacker to
manipulate SQL queries in the backend database allowing for the manipulation or disclosure of arbitrary data.
Impact Level: Application
Solution
No solution or patch is available as of 9th
February, 2015. Information regarding this issue will be updated once the solution details are available. For updates refer to
https://wordpress.org/plugins/cp-multi-view-calendar/
Insight
Input passed via the 'calid' GET parameter
is not properly sanitized before being returned to the user.
Affected
CP Multi View Event Calendar version 1.01
Detection
Send a crafted data via HTTP GET request
and check whether it is able to execute sql query or not.
References