header-logo
Suggest Exploit
vendor:
Search Meter
by:
Daniel Monzón (stark0de)
5.5
CVSS
MEDIUM
CSV Injection
20
CWE
Product Name: Search Meter
Affected Version From: 2.13.2
Affected Version To: 2.13.2
Patch Exists: NO
Related CWE:
CPE: a:thunderguy:search_meter:2.13.2
Metasploit:
Other Scripts:
Platforms Tested: Windows 7 x86 SP1
2020

WordPress Plugin Search Meter 2.13.2 – CSV Injection

There is a CSV injection vulnerability in the Export function of the Search Meter plugin version. The payload is introduced in the search bar in Wordpress and when the CSV file is exported and opened in Excel, the payload gets executed.

Mitigation:

To mitigate this vulnerability, it is recommended to update to the latest version of the Search Meter plugin.
Source

Exploit-DB raw data:

# Exploit Title: Wordpress Plugin Search Meter 2.13.2 - CSV Injection
# Google Dork: N/A
# Date: 2020-03-10
# Exploit Author: Daniel Monzón (stark0de)
# Vendor Homepage: https://thunderguy.com/semicolon/
# Software Link: https://downloads.wordpress.org/plugin/search-meter.2.13.2.zip
# Version: 2.13.2
# Tested on: Windows 7 x86 SP1
# CVE : N/A

There is a CSV injection vulnerability in the Export function of the Search Meter plugin version 

1) First we introduce the payload in the search bar in Wordpress

=cmd|' /C notepad'!'A1'


2) Then we go to http://127.0.0.1/wordpress/wp-admin/index.php?page=search-meter%2Fadmin.php and export the CSV file


3) After that we open the file in Excel, and import data from an external file, using comma as separator


4) Payload gets executed


Tested on Windows 7 Pro SP1 32-bit, Wordpress 5.3.2 and Excel 2016