Multiple SQL injection vulnerabilities in the Apptha WordPress Video Gallery (contus-video-gallery) plugin 2.5, possibly as distributed before 2014-07-23, for WordPress allow (1) remote attackers to execute arbitrary SQL commands via the vid parameter in a myextract action to wp-admin/admin-ajax.php or (2) remote authenticated users to execute arbitrary SQL commands via the playlistId parameter in the newplaylist page or (3) videoId parameter in a newvideo page to wp-admin/admin.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html | Exploit |
http://wordpress.org/plugins/contus-video-gallery/changelog | Patch Vendor Advisory |
http://www.securityfocus.com/bid/68883 | Exploit |
Configurations
History
No history.
Information
Published : 2014-11-26 15:59
Updated : 2014-11-28 14:10
NVD link : CVE-2014-9097
Mitre link : CVE-2014-9097
CVE.ORG link : CVE-2014-9097
JSON object : View
Products Affected
apptha
- contus_video_gallery
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')