vendor:
Freshmail Newsletter
by:
Felipe Molina de la Torre
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Freshmail Newsletter
Affected Version From: <= 1.5.8
Affected Version To: 1.6
Patch Exists: Yes
Related CWE: N/A
CPE: a:freshmail:freshmail_newsletter
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux 2.6, PHP 5.3 with magic_quotes_gpc turned off, Apache 2.4.0 (Ubuntu)
2015
Unauthenticated SQL Injection on WordPress Freshmail (#1)
Freshmail plugin is an email marketing plugin for wordpress, allowing the administrator to create mail campaigns and keep track of them. There is a SQL Injection vulnerability available for collaborators (or higher privileged users) for webs with freshmail plugin installed. The SQL Injection in located in the attribute "id" of the inserted shortcode [FM_form *id="N"*]. The shortcode attribute "id" is not sanitized before inserting it in a SQL query. A collaborator can insert shortcodes when he/she is editing a new post or page and can preview the results (no administrator approval needed), launching this SQL Injection.
Mitigation:
The vendor has released a patch in version 1.6 to fix this vulnerability.