vendor:
Count per Day
by:
Miroslav Stampar
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Count per Day
Affected Version From: 2.17
Affected Version To: 2.17
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:count_per_day:2.17
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2011
WordPress Count per Day plugin <= 2.17 SQL Injection Vulnerability
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'month' parameter of the 'notes.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in the context of the application. This can allow the attacker to bypass authentication and gain access to the application data.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to construct SQL commands that are passed to the database. All input data should be validated and filtered, and special characters should be escaped or removed.