Participants Database Plugin for WordPress 'query' Parameter SQL Injection

critical Nessus Plugin ID 76072

Synopsis

The remote web server hosts a PHP script that is affected by a SQL injection vulnerability.

Description

The Participants Database Plugin for WordPress installed on the remote host is affected by a SQL injection vulnerability due to a failure to properly sanitize user-supplied input to the 'query' parameter in the pdb-signup script. An unauthenticated, remote attacker can exploit this issue to inject or manipulate SQL queries in the back-end database, resulting in the manipulation or disclosure of arbitrary data.

Note that the application is also reportedly affected by an unspecified flaw in which insufficient privilege checks allow an unauthenticated user to execute actions reserved for administrative users when shortcodes are used; however, Nessus has not tested this issue.

Solution

Upgrade to Participants Database Plugin version 1.5.4.9 or later.

See Also

https://seclists.org/fulldisclosure/2014/Jun/0

https://wordpress.org/plugins/participants-database/#changelog

Plugin Details

Severity: Critical

ID: 76072

File Name: wordpress_participants_database_sql_injection.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 6/16/2014

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress, cpe:/a:xnau:participants_databas3

Required KB Items: installed_sw/WordPress, www/PHP

Exploit Available: true

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 5/31/2014

Vulnerability Publication Date: 6/1/2014

Reference Information

CVE: CVE-2014-3961

BID: 67769