The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application.
References
Link | Resource |
---|---|
https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/ | Third Party Advisory |
https://wpdatatables.com/help/whats-new-changelog/ | Release Notes Vendor Advisory |
https://wpscan.com/vulnerability/21aa7e18-0162-45bf-a5c6-ceee64ffa1f9 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-04-12T13:59:38
Updated: 2021-04-12T13:59:38
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24200
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-12T14:15:15.007
Modified: 2021-04-13T20:16:26.067
Link: CVE-2021-24200
JSON object: View
Redhat Information
No data.
CWE