Short Name |
HTTP:SQL:INJ:WORDPRESS-ID |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
WordPress Generic "ID" Parameter SQL Injection |
Release Date |
2011/09/01 |
Update Number |
1984 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature covers numerous vulnerabilities in WordPress Add-on Modules. Most modules are made by third-party groups that fail to protect against SQL injection. The WordPress "ID" parameter is a common target. This signature detects typical SQL commands sent to an ID parameter of a WordPress enabled website.
The WP Bannerize plug-in for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WP Bannerize versions 2.8.6 and prior are vulnerable.