HTTP: WordPress Symposium Plugin get_profile_avatar.php SQL Injection

This signature detects attempts to exploit a known vulnerability in the WordPress Symposium Plugin. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

The WP Symposium plugin for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WP Symposium 0.64 is vulnerable; other versions may also be affected.

Affected Products

Wp_symposium wp_symposium

References

BugTraq: 49205

URL: http://wordpress.org/

Short Name
HTTP:SQL:INJ:WP-SYMPOSIUM
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Injection Plugin SQL Symposium WordPress bid:49205 get_profile_avatar.php
Release Date
08/23/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Wp_symposium

Found a potential security threat?