Full Disclosure mailing list archives

SQL injection vulnerability in Booking Calendar WordPress Plugin


From: Summer of Pwnage <lists () securify nl>
Date: Mon, 1 Aug 2016 09:11:50 +0200

------------------------------------------------------------------------
SQL injection vulnerability in Booking Calendar WordPress Plugin
------------------------------------------------------------------------
Edwin Molenaar, July 2016

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
An SQL injection vulnerability exists in the Booking Calendar WordPress
plugin. This vulnerability allows an attacker to view data from the
database. The affected parameter is not properly sanitized or protected
with an anti-Cross-Site Request Forgery token. Consequently, it can
(also be exploited by luring the target user into clicking a specially
crafted link or visiting a malicious website (or advertisement).

------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160714-0002

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
These issues were successfully tested on Booking Calendar WordPress
Plugin version 6.2.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
This issue is resolved in Booking Calendar version 6.2.1.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://sumofpwn.nl/advisory/2016/sql_injection_vulnerability_in_booking_calendar_wordpress_plugin.html

------------------------------------------------------------------------
Summer of Pwnage (https://sumofpwn.nl) is a Dutch community project. Its
goal is to contribute to the security of popular, widely used OSS
projects in a fun and educational way.

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/


Current thread: