vendor:
AdRotate
by:
High-Tech Bridge Security Research Lab
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: AdRotate
Affected Version From: 3.9.4
Affected Version To: 3.9.4
Patch Exists: YES
Related CWE: CVE-2014-1854
CPE: a:ajdg_solutions:adrotate
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2014-3694/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2014-3696/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2014-3698/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2014-3695/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-1863/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2014
SQL Injection in AdRotate: CVE-2014-1854
The vulnerability exists due to insufficient validation of 'track' HTTP GET parameter passed to '/wp-content/plugins/adrotate/library/clicktracker.php' script. A remote unauthenticated attacker can execute arbitrary SQL commands in application's database. The following PoC code contains a base64-encoded string '-1 UNION SELECT version(),1,1,1', which will be injected into SQL query and will output MySQL server version.
Mitigation:
Update to AdRotate 3.9.5