SQL injection vulnerability in wp-load.php in the BuddyPress plugin 1.5.x before 1.5.5 of WordPress allows remote attackers to execute arbitrary SQL commands via the page parameter in an activity_widget_filter action.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://buddypress.org/2012/03/buddypress-1-5-5/ | patch vendor advisory |
http://www.exploit-db.com/exploits/18690 | exploit |
http://osvdb.org/80763 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/04/16/10 | mailing list |
http://www.openwall.com/lists/oss-security/2012/04/15/2 | mailing list exploit |
http://seclists.org/bugtraq/2012/Apr/4 | mailing list exploit |