{"id":4522,"date":"2024-08-19T14:35:16","date_gmt":"2024-08-19T14:35:16","guid":{"rendered":"http:\/\/127.0.0.1\/inyeccion-sql-autenticada-en-shopping-cart-ecommerce-store-5-7-2-a-traves-del-parametro-model_number\/"},"modified":"2024-08-19T14:35:16","modified_gmt":"2024-08-19T14:35:16","slug":"inyeccion-sql-autenticada-en-shopping-cart-ecommerce-store-5-7-2-a-traves-del-parametro-model_number","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/inyeccion-sql-autenticada-en-shopping-cart-ecommerce-store-5-7-2-a-traves-del-parametro-model_number\/","title":{"rendered":"Inyecci\u00f3n SQL autenticada en Shopping Cart & eCommerce Store <= 5.7.2 a trav\u00e9s del par\u00e1metro model_number"},"content":{"rendered":"
<\/p>\n
El plugin de Shopping Cart & eCommerce Store para WordPress es vulnerable a Inyecci\u00f3n SQL basada en booleanos a trav\u00e9s del par\u00e1metro ‘model_number’ en todas las versiones hasta, e incluyendo, la 5.7.2 debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2219],"class_list":["post-4522","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-7827"],"yoast_head":"\n