WordPress Calendar-Script Blind SQL Injection

2012.11.10
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: Wordpress Calendar-Script Plugin Blind SQL Injection Vulnerability # Google Dork: inurl:"/Calendar-Script/load.php?cid=1" or "intext:Copyright phpcalendarscripts.com " # Exploit Author: Ashiyane Digital Security Team # Vendor Homepage: http://phpcalendarscripts.com/ # Tested on: Windows 7 ############################################################### * Location: http://site.com/wp-content/plugins/Calendar-Script/load-events.php?cid=1[SQL] *************************************************************** * Greetz to: My Lord ALLAH * Sp Tnx To: Behrooz_Ice,Q7X,Ali_Eagle,Azazel,iman_taktaz,sha2ow,0x21HATE,A.S.P.I.R.I.N,am118,Angel--D3m0n,angola,AR455,Azad,Black-Hole,Classic,Encoder,ERroR,Hashor * HASSAN20,HidDeEn,hossein19123,jooooondost,Kaz3m,ll_Invisible_ll,majidflash,megacpu,MehrdadLinux,Milad-Bushehr,MostafaBestMan,MR.SAMAN,Mute,N4H,Pr0grammer,PrinceofHacking * Rizux,Rz04,S!YOU.T4r.6T,Sil3nt Di3,The Smith,unique2world,Unline,V!T0N,X-HIDDEN-X * Crypt0,khatarnak,Milad22,MR.Vinci,Pirjo,V1R4N64R * And All Of My Friends * The Last One : My Self, Milwar *************************************************************** ###############################################################

References:

http://phpcalendarscripts.com/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top