vendor:
Global Content Blocks
by:
Miroslav Stampar
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Global Content Blocks
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:global_content_blocks
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
WordPress Global Content Blocks plugin <= 1.2 SQL Injection Vulnerability
The vulnerability exists due to insufficient filtration of user-supplied input passed via the 'gcb' HTTP GET parameter to '/wp-content/plugins/global-content-blocks/gcb/gcb_export.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database.
Mitigation:
Update to version 1.3 or later.