Description
WordPress Plugin Tune Library is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Successful exploitation requires that "magic_quotes" directive is set to "Off" and plugin setting "Filter artists by letter and show alphabetical navigation" is turned on. WordPress Plugin Tune Library version 1.5.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.5.2 or latest
References
http://www.securityfocus.com/bid/49553/exploit
http://www.exploit-db.com/exploits/17816/
http://packetstormsecurity.com/files/view/104971/wptunelibrary-sql.txt
Related Vulnerabilities
Oracle Database Server Credentials Management Errors Vulnerability (CVE-2007-6260)
WordPress Plugin Opening Hours Cross-Site Scripting (2.3.0)
WordPress Plugin Htaccess by BestWebSoft Cross-Site Scripting (1.7.5)
Joomla! Core Remote Code Execution (1.5.0 - 3.4.5)
WordPress Plugin Custom Login Page Customizer-LoginPress Multiple Vulnerabilities (1.1.13)