[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress Video Gallery 2.7.0 SQL Injection Vulnerability

Author
Claudio Viviani
Risk
[
Security Risk High
]
0day-ID
0day-ID-23286
Category
web applications
Date add
12-02-2015
CVE
CVE-2014-9097
Platform
php
######################
 
# Exploit Title : Wordpress Video Gallery 2.7 SQL Injection Vulnerability
 
# Exploit Author : Claudio Viviani
 
# Vendor Homepage : http://www.apptha.com/category/extension/Wordpress/Video-Gallery
 
# Software Link : https://downloads.wordpress.org/plugin/contus-video-gallery.2.7.zip
 
# Dork Google: inurl:/wp-admin/admin-ajax.php?action=rss
             
 
# Date : 2015-02-11
 
# Tested on : Windows 7 / Mozilla Firefox
              Linux / Mozilla Firefox        
 
######################
 
# Vulnerability Disclosure Timeline:
 
2015-02-08:  Discovered vulnerability
2015-02-09:  Vendor Notification
2015-02-10:  Vendor Response/Feedback
2015-02-10:  Vendor Send Fix/Patch
2015-02-11:  Public Disclosure
 
# Description
 
Wordpress Video Gallery 2.7 suffers from SQL injection
 
 
######################
 
# PoC
 
http://target/wp-admin/admin-ajax.php?action=rss&type=video&vid=[SQLi]
 
 
#####################
 
# Fix/patch sent by apptha's developer
 
File: videogalleryrss.php
 
Change line n.47
 
from:
 
        $vid             = filter_input(INPUT_GET,'vid');
to:
 
        $vid             = intval(filter_input(INPUT_GET,'vid'));
 
#####################
 
Discovered By : Claudio Viviani
            http://www.homelab.it
            info@homelab.it
            homelabit@protonmail.ch
 
            https://www.facebook.com/homelabit
            https://twitter.com/homelabit
            https://plus.google.com/+HomelabIt1/
        https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww
 
#####################

#  0day.today [2024-09-19]  #