vendor:
LeagueManager
by:
javabudd
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: LeagueManager
Affected Version From: 3.9.11
Affected Version To: 3.9.11
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:leaguemanager
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux | Windows
2015
WordPress LeagueManager SQLi
The WordPress LeagueManager plugin is vulnerable to an unauthenticated SQL injection vulnerability. The vulnerable code is located in the lib/core.php file, where the getMatch() and getLeague() functions are passed an unsanitized $match_id and $league_id parameter to the SQL query. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can be done using a tool such as SQLMap, which can be used to send a payload to the vulnerable server and extract data from the database.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all user-supplied input is properly sanitized before being used in an SQL query. Additionally, it is recommended to keep the WordPress LeagueManager plugin up to date with the latest version.