{"id":4519,"date":"2024-08-16T22:35:13","date_gmt":"2024-08-16T22:35:13","guid":{"rendered":"http:\/\/127.0.0.1\/tagdiv-opt-in-builder-1-4-4-inyeccion-sql-autenticada-admin\/"},"modified":"2024-08-16T22:35:13","modified_gmt":"2024-08-16T22:35:13","slug":"tagdiv-opt-in-builder-1-4-4-inyeccion-sql-autenticada-admin","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/tagdiv-opt-in-builder-1-4-4-inyeccion-sql-autenticada-admin\/","title":{"rendered":"tagDiv Opt-In Builder <= 1.4.4 – Inyecci\u00f3n SQL Autenticada (Admin+)"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad de Inyecci\u00f3n SQL en tagDiv Opt-In Builder a trav\u00e9s del par\u00e1metro ‘subscriptionCouponId’ en la API REST ‘create_stripe_subscription’ en versiones hasta 1.4.4 permite a atacantes autenticados con privilegios de administrador insertar consultas SQL adicionales para extraer informaci\u00f3n sensible de la base de datos. La falta de escapado adecuado en el par\u00e1metro proporcionado por el […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2216],"class_list":["post-4519","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2023-3416"],"yoast_head":"\n