The FlightLog WordPress plugin through 3.0.2 does not sanitise, validate or escape various POST parameters before using them a SQL statement, leading to SQL injections exploitable by editor and administrator users
References
Link | Resource |
---|---|
https://codevigilant.com/disclosure/2021/wp-plugin-flightlog-sql-injection/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/dda0593e-cd97-454e-a8c8-15d7f690311c | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-06-07 11:15
Updated : 2021-06-14 18:01
NVD link : CVE-2021-24336
Mitre link : CVE-2021-24336
CVE.ORG link : CVE-2021-24336
JSON object : View
Products Affected
zavedil
- flightlog
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')