S@BUN is at it again, this time, reporting multiple SQL Injection Vulnerabilities within the Photo Album plugin for WordPress. According to the security bulletin:
Multiple vulnerabilities have been identified in Photo Album (plugin for WordPress), which could be exploited by remote attackers to execute arbitrary SQL queries. These issues are caused by input validation errors in the “wppa.php” script when passing user-supplied parameters (e.g. “photo” or “album”) to certain functions (e.g. “wppa_album_name()” or “wppa_photo_name()”), which could be exploited by malicious people to conduct SQL injection attacks.
Multiple security advisory services places this round of vulnerabilities as a Moderate Risk. For example, FrSIRT describes the Moderate risk as being:
Remotely and locally exploitable flaws, which could lead to denial of Service or privilege escalation.
Versions 1.1 and prior of this plugin are vulnerable. As always, it is recommended that you disable this plugin until a patch for it is released.
[EDIT] Version 1.1 is a fix for this vulnerability. Versions 1.0 and prior might be vulnerable.
As the author of the plugin, I’m pretty sure that 1.1 is secure. 1.1 is a security release to fix the issues mentioned. I had a few people contact me about the issues, and I had some people look at the 1.1 code.
If someone can prove that version 1.1 is vulnerable, please contact me ASAP. if not, please post a clarification.
@LobsterMan – clarifications, u ever heard of milw0rm. pronto
Inaccurate. 1.1 fixes these problems. See the original security advisory here:
http://secunia.com/advisories/28988/
Note this:
Solution: Update to version 1.1.