|
|||
Rule General Information |
---|
Release Date: | 2020-02-20 | |
Rule Name: | WordPress Google Maps Plugin SQL Injection Vulnerability (CVE-2019-10692) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | In the wp-google-maps plugin before 7.11.18 for WordPress, includes/class.rest-api.php in the REST API does not sanitize field names before a SELECT statement. | |
Impact: | An attacker can inject arbitrary sql commands to view or change the database of the target by exploiting the vulnerability successfully. | |
Affected OS: | Windows, Linux | |
Reference: | http://www.rapid7.com/db/modules/auxiliary/admin/http/wp_google_maps_sqli https://plugins.trac.wordpress.org/changeset?old_path=%2Fwp-google-maps&old=2061433&new_path=%2Fwp-google-maps&new=2061434&sfp_email=&sfph_mail=#file755 https://wordpress.org/plugins/wp-google-maps/#developers |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://wordpress.org/plugins/wp-google-maps/#developers |