SQL injection vulnerability in adrotate/adrotate-out.php in the AdRotate plugin 3.6.6, and other versions before 3.6.8, for WordPress allows remote attackers to execute arbitrary SQL commands via the track parameter (aka redirect URL).
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 01:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://downloads.wordpress.org/plugin/adrotate.3.6.8.zip - Patch | |
| References | () http://secunia.com/advisories/46814 - | |
| References | () http://unconciousmind.blogspot.com/2011/11/wordpress-adrotate-plugin-366-sql.html - Exploit | |
| References | () http://www.exploit-db.com/exploits/18114 - Exploit | |
| References | () http://www.securityfocus.com/bid/50674 - | 
Information
                Published : 2011-12-02 18:55
Updated : 2025-04-11 00:51
NVD link : CVE-2011-4671
Mitre link : CVE-2011-4671
CVE.ORG link : CVE-2011-4671
JSON object : View
Products Affected
                adrotateplugin
- adrotate
wordpress
- wordpress
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
