vendor:
leaguemanager
by:
Joshua Reynolds
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: leaguemanager
Affected Version From: 3.8
Affected Version To: 3.8
Patch Exists: NO
Related CWE: CVE-2013-1852
CPE: 2.3:a:wordpress:leaguemanager
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: BT5R1 - Ubuntu 10.04.2 LTS
2013
WordPress LeagueManager Plugin v3.8 SQL Injection
An SQL Injection vulnerability exists in the league_id parameter of a function call made by the leaguemanager_export page. This request is processed within the leaguemanager.php which does not sanitize of SQL injection, and is passed to the admin/admin.php page into the export( $league_id, $mode ) function which also does not sanitize for SQL injection when making this call: $this->league = $leaguemanager->getLeague($league_id). The information is then echoed to a CSV file that is then provided.
Mitigation:
A possible fix for this would be to cast the league_id to an integer during any of the function calls. The functions should also not be available to public requests, and thus session handling should also be checked prior to the requests being processed within the admin section.