Findings
- Note that this plugin is very large at 32k lines
- The plugin is very likely to have arbitrary code exploits
- The plugin has SQL injections as a documented feature – you can click a button and a form will pop-up asking you what SQL you want to inject, and insert a shortcode with your SQL into the post: [pods name=”alert1″ where=”sleep(999)”]abc[/pods]
- Contains many instances of eval()
If you choose to deploy this plugin, we recommend that you set PODS_DISABLE_EVAL to true, which will prevent a large class of potential attacks against this plugin.
Reason for the 'Potentially unsafe' result
The plugin contains or is likely to contain a vulnerability which could be exploited by an end user and which would compromise the site’s confidentiality, integrity or availability:
Contains SQL injections (intentionally). Probably contains arbitrary code execution vulnerabilities due to the amount of eval() calls.