Mingle Forum Plugin for WordPress 'topic' parameter SQL Injection

high Nessus Plugin ID 51586

Synopsis

The remote web server hosts a PHP script that is affected by a SQL injection vulnerability.

Description

The version of the Mingle Forum plugin for WordPress installed on the remote host is affected by a SQL injection vulnerability.

The plugin fails to properly sanitize user-supplied input to the 'topic' parameter of the 'feed.php' script. An unauthenticated, remote attacker can leverage this issue to launch a SQL injection attack against the affected application, leading to authentication bypass, disclosure of sensitive information, or attacks against the underlying database.

Note that this version is also affected by several other SQL injection vulnerabilities and an authentication bypass vulnerability; however, Nessus has not specifically tested for these issues.

Solution

Update to Mingle Forum plugin version 1.0.27 or later.

See Also

http://www.nessus.org/u?42a5fe99

http://www.nessus.org/u?e0cc1a96

Plugin Details

Severity: High

ID: 51586

File Name: wordpress_mingle_forum_rss_sql_injection.nasl

Version: 1.14

Type: remote

Family: CGI abuses

Published: 1/20/2011

Updated: 6/5/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/7/2011

Vulnerability Publication Date: 1/8/2011

Reference Information

BID: 45733

Secunia: 42829