Multiple SQL injection vulnerabilities in the Apptha WordPress Video Gallery (contus-video-gallery) plugin 2.5, possibly as distributed before 2014-07-23, for WordPress allow (1) remote attackers to execute arbitrary SQL commands via the vid parameter in a myextract action to wp-admin/admin-ajax.php or (2) remote authenticated users to execute arbitrary SQL commands via the playlistId parameter in the newplaylist page or (3) videoId parameter in a newvideo page to wp-admin/admin.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/127611/WordPress-Video-Gallery-2.5-Cross-Site-Scripting-SQL-Injection.html | Exploit |
http://wordpress.org/plugins/contus-video-gallery/changelog | Patch Vendor Advisory |
http://www.securityfocus.com/bid/68883 | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:20:41
Updated: 2022-10-03T16:20:41
Reserved: 2022-10-03T00:00:00
Link: CVE-2014-9097
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-11-26T15:59:13.293
Modified: 2014-11-28T14:10:46.033
Link: CVE-2014-9097
JSON object: View
Redhat Information
No data.
CWE