WordPress是一款免费的论坛Blog系统。 WordPress的WassUp插件存在输入验证漏洞,远程攻击者可能利用此漏洞执行SQL注入攻击。 WordPress的WassUp插件中\'\'main.php文件没有正确地验证对to_date参数的输入: # if (isset($_GET[\'\'to_date\'\'])) $to_date = HTMLentities(strip_tags($_GET[\'\'to_date\'\'])); # ........... # spyview($from_date,$to_date,$rows); # # -In main.php # # function spyview ($from_date=\"\",$to_date=\"\",$rows=\"999\") { # ........... # $qryC = $wpdb->get_results(\"SELECT id, wassup_id, max(timestamp) as max_timestamp, ip, hostname, searchengine, # urlrequested, agent, referrer, spider, username, comment_author FROM $table_name WHERE timestamp BETWEEN $from_date AND # $to_date GROUP BY id ORDER BY max_timestamp DESC\"); 这允许远程攻击者通过注入任意SQL代码控制SQL查询。
WordPress是一款免费的论坛Blog系统。 WordPress的WassUp插件存在输入验证漏洞,远程攻击者可能利用此漏洞执行SQL注入攻击。 WordPress的WassUp插件中\'\'main.php文件没有正确地验证对to_date参数的输入: # if (isset($_GET[\'\'to_date\'\'])) $to_date = HTMLentities(strip_tags($_GET[\'\'to_date\'\'])); # ........... # spyview($from_date,$to_date,$rows); # # -In main.php # # function spyview ($from_date=\"\",$to_date=\"\",$rows=\"999\") { # ........... # $qryC = $wpdb->get_results(\"SELECT id, wassup_id, max(timestamp) as max_timestamp, ip, hostname, searchengine, # urlrequested, agent, referrer, spider, username, comment_author FROM $table_name WHERE timestamp BETWEEN $from_date AND # $to_date GROUP BY id ORDER BY max_timestamp DESC\"); 这允许远程攻击者通过注入任意SQL代码控制SQL查询。