HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

Ajax Category Dropdown plugin is prone to multiple SQL-injection vulnerabilities and a cross-site scripting vulnerability. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Ajax Category Dropdown 0.1.5 is vulnerable; other versions may also be affected.

Affected Products

Dyasonhat ajax_category_dropdown

References

BugTraq: 47529

URL: http://www.wordpress.org

Short Name
HTTP:SQL:INJ:WP-AJAX-CATEGORY
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Ajax Category Dropdown Injection Plugin SQL WordPress bid:47529
Release Date
04/25/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Dyasonhat

Found a potential security threat?