Answer My Question 1.3 Plugin for WordPress – Sql Injection

Homepage:

https://wordpress.org/plugins/answer-my-question/

Description:

$_POST['id'] is not escaped. Url is accessible for any user.

Url vulnerable : http://target/wp-content/plugins/answer-my-question/modal.php

File / Code:

File: /wp-content/plugins/answer-my-question/modal.php

require_once('../../../wp-load.php');
global $wpdb;
$table_name = $wpdb->prefix . "answer_my_question";

$result = $wpdb->get_results("SELECT * FROM $table_name WHERE id=".$_POST['id']." LIMIT 1;");

Proof of Concept:

sqliinjectionaswner1 sqliinjectionaswner2

OR
sqliinjectionaswner3

OBS: Change ID until return session_user

Timeline:

  • 10/11/2016 – Discovered

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to Top