漏洞标题
LTL Freight Quotes – Purolator Edition <= 2.2.3 - 未认证的SQL注入漏洞
漏洞描述信息
WordPress使用的LTL Freight Quotes – Purolator Edition插件在所有版本中(包括2.2.3版本)存在SQL注入漏洞。该漏洞是由于对用户提供的参数'dropship_edit_id'和'edit_id'处理不当,未进行充分的转义处理,并且在现有SQL查询中缺乏充分的准备,导致未经身份验证的攻击者能够将额外的SQL查询附加到已有的查询中,从而可能从数据库中提取敏感信息。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
LTL Freight Quotes – Purolator Edition <= 2.2.3 - Unauthenticated SQL Injection
漏洞描述信息
The LTL Freight Quotes – Purolator Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 2.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)