CVE-2020-24315 – WordPress Poll <= 36 - SQL Injection
https://notcve.org/view.php?id=CVE-2020-24315
Vinoj Cardoza WordPress Poll Plugin v36 and lower executes SQL statement passed in via the pollid POST parameter due to a lack of user input escaping. This allows users who craft specific SQL statements to dump the entire targets database. Vinoj Cardoza WordPress Poll Plugin versión v36 e inferior, ejecuta la sentencia SQL pasada por medio del parámetro POST pollid debido a una falta de escape de entrada del usuario. Esto permite a usuarios que diseñan sentencias SQL específicas volcar toda la base de datos de objetivos The Poll Plugin for WordPress is vulnerable to blind SQL Injection via the 'pollid' parameter in versions up to, and including, 36 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://wordpress.org/plugins/cardoza-wordpress-poll https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •