WordPress Plugin Podlove Podcast...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

The second plugin that will be dissected is called Podlove Publisher, a Wordpress plugin to manage podcasts. It suffered from multiple SQL injections and cross-site scripting vulnerabilities (funnily enough also in a parameter named tab) that are fixed by now. The SQL injections were all caused by the following code. lib/settings/feed.php private function save() { $feed = \Podlove\Model\Feed::find_by_id( $_REQUEST[‘feed’] ); $feed->update_attributes( $_POST[‘podlove_feed’] ); lib/model/base.php line 55~60 public function update_attributes( $attributes ) { ⋮ foreach ( $attributes as $key => $value ) $this->{$key} = $value; ⋮ return $this->save(); line 323~348 public function save() { global $wpdb; if ( $this->is_new() ) { $this->set_defaults(); $sql = 'INSERT INTO ' . static::table_name() . ' ( ' . implode( ',', self::property_names() ) . ' ) ' . 'VALUES' . ' ( ' . implode( ',', array_map( array( $this, 'property_name_to_sql_value' ), self::property_names() ) ) . ' );' ; $success =...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息