Synopsis
The remote web server contains a PHP script that is affected by a SQL injection vulnerability.
Description
The remote host is running WP-Forum, a third-party discussion forum plugin for WordPress.
The version of WP-Forum installed on the remote host fails to sanitize input to the 'thread' parameter of the 'forum_feed.php' script before using it in a database query. Regardless of PHP's 'magic_quotes_gpc' setting, an attacker can exploit this issue to manipulate database queries, leading to the disclosure of sensitive information, the modification of data, or attacks against the underlying database.
Solution
Unknown at this time.
Plugin Details
File Name: wordpress_wp_forum_thread_sql_injection.nasl
Supported Sensors: Nessus
Enable CGI Scanning: true
Vulnerability Information
CPE: cpe:/a:wordpress:wordpress
Required KB Items: installed_sw/WordPress, www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Exploited by Nessus: true
Vulnerability Publication Date: 1/12/2009
Reference Information
BID: 33223