This plugin was responsable for my blogs getting hacked as they use highly vulnerable code in this plugin.
There is no protection against SQL injection in the plugin functions. Request parameters are added happily to some SQL query without escaping them; in the following example
$galleryIDis a simply copy of
$pictures = $wpdb->get_results("SELECT t.*, tt.* FROM $wpdb->nggallery AS t INNER JOIN $wpdb->nggpictures AS tt ON t.gid = tt.galleryid WHERE t.gid = '$galleryID' AND tt.exclude != 1 ORDER BY tt.$ngg_options[galSort] $ngg_options[galSortDir] ");
I recommend to not use this plugin at all. It was obviously developed by some programming beginner and should not be used on production site.
Example: Set your own activation key for a user to reset the password to your own:
- The topic ‘Bad programmed plugin with vulnerabilities’ is closed to new replies.