WordPress Related Posts Exit Popup SQL Injection

2012.11.13
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

######################In the name of GOD####################### # Exploit Title: Wordpress related_posts_exit_popup SQL Injection Vulnerability # Google Dork: inurl:"/related_posts_exit_popup_window.php" # OR intitle:"Thanks for visiting our site" # Exploit Author: Ashiyane Digital Security Team # Category: Web Application # Tested on: Windows 7 ############################################################### * Location: http://site.com/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=[SQLi] * Demo: http://modelingXXXcess.com/free/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=2571 * http://a-XXXp.com/pain/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=600 * http://gtaXXXXes.com/Downtown-Toronto/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=1443 * http://cancXXXXguide.com/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=862 *************************************************************** * Greetz to: My Lord ALLAH * Sp Tnx To: Muslims From All Over The World * Behrooz_Ice,Q7X,Ali_Eagle,Azazel,iman_taktaz,sha2ow,0x21HATE,A.S.P.I.R.I.N,am118,Angel--D3m0n,angola,AR455,Azad,Black-Hole,Classic,Encoder,ERroR,Hashor * HASSAN20,HidDeEn,hossein19123,jooooondost,Kaz3m,ll_Invisible_ll,majidflash,megacpu,MehrdadLinux,Milad-Bushehr,MostafaBestMan,MR.SAMAN,Mute,N4H,Pr0grammer,PrinceofHacking * Rizux,Rz04,S!YOU.T4r.6T,Sil3nt Di3,The Smith,unique2world,Unline,V!T0N,X-HIDDEN-X * Crypt0,khatarnak,Milad22,MR.Vinci,Pirjo,V1R4N64R * And All Of My Friends * The Last One : My Self, Milwar *************************************************************** ###############################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top