vendor:
BBS e-Franchise
by:
Lenon Leite
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: BBS e-Franchise
Affected Version From: 1.1.1
Affected Version To: 1.1.1
Patch Exists: NO
Related CWE: N/A
CPE: a:wordpress:bbs_e-franchise:1.1.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 8.1
2016
BBS e-Franchise 1.1.1 Plugin of WordPress – Sql Injection
$_GET['uid'] is not escaped, allowing an attacker to inject arbitrary SQL commands. An attacker can exploit this vulnerability by crafting a malicious URL and sending it to a victim. The malicious URL contains a specially crafted SQL query that is injected into the application's database.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query.