SQL Injection
-
Hello again,
Bad news, there are a lot of SQL Injections vulnerabilities in the code. For example, the file admin/luc_admin.php have an unvalidated “$querylimit”.
(one example)
[…]
$querylimit = (isset ($_POST[‘hitsrows’]) ? $_POST[‘hitsrows’] : $StatPressV_Option[‘StatPressV_Rows_Per_Latest’]);
[…]
$rks = $wpdb->get_results(“SELECT date, time, ip,urlrequested, os, browser,feed,user, language, country, post_title
FROM $table_name
WHERE (os<>” OR browser <>”)
ANDspiderNOT LIKE ‘%Spam Bot%’
ORDER BY id DESC LIMIT $querylimit;”);[…]
As far I know, exploit after “LIMIT” is not easy/trivial, but the vulnerability exists and should be fixed.I don’t check entire code, so, maybe others files have more.
Regards.
The topic ‘SQL Injection’ is closed to new replies.