Vigil@nce - WordPress Double Opt-In for Download: SQL injection
January 2016 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use a SQL injection of WordPress Double Opt-In for
Download, in order to read or alter data.
Impacted products: WordPress Plugins not comprehensive.
Severity: 2/4.
Creation date: 27/11/2015.
DESCRIPTION OF THE VULNERABILITY
The WordPress Double Opt-In for Download product uses a database.
However, user’s data are directly inserted in a SQL query.
An attacker can therefore use a SQL injection of WordPress Double
Opt-In for Download, in order to read or alter data.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WordPress-Double-Opt-In-for-Download-SQL-injection-18387