0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Wordpress Plugin Facebook Survey v1 SQL Injection Vulnerability
Wordpress Facebook Survey v1 - SQL Injection Vulnerability Introduction: ============= Wordpress Facebook Survey Pro is an easy to install & use Wordpress plugin. Get started right away, and set up as many timeline optin pages as you want. This plugin gets to the point, and makes it so you get the BEST answers from your FB fans. You can add a custom success page so you can offer incentives for your fans to complete the survey. It`s the BEST way to get feedback! (Copy of the Vendor Homepage: http://fbsurveypro.com/ ) Details: ======== A blind SQL Injection vulnerability is detected in the commercial Wordpress Facebook Survey Pro Plugin. The vulnerability allows an attacker (remote) or local low privileged user account to execute a SQL commands on the affected application dbms. The blind sql injection vulnerability is located in index.php file (timeline module) with the bound vulnerable id parameter. Successful exploitation of the vulnerability results in dbms & application compromise. Exploitation requires no user interaction & without privileged application user account. Vulnerable Module(s): [+] timeline/ Vulnerable File(s): [+] index.php Vulnerable Parameter(s): [+] id Proof of Concept: ================= The SQL injection vulnerability can be exploited by remote attackers without privileged application user accounr and without required user inter action. For demonstration or reproduce ... PoC: http://[SERVER]/[WORDPRESS]/wp-content/plugins/plugin-dir/timeline/index.php?id=1'-1 union select 1,2,3,4,5[SQL-Injection]-- Solution: ========= Filter the id input, or use the intval() php function to make sure the input is an integer. Risk: ===== The security risk of the remote blind sql injection vulnerability is estimated as critical. # 0day.today [2024-11-16] #