Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:32173
HistoryJun 08, 2015 - 12:00 a.m.

CVE-2015-4109 - WordPress Users Ultra Plugin [SQL injection]

2015-06-0800:00:00
vulners.com
10

Exploit Title: CVE-2015-4109 - WordPress Users Ultra Plugin [SQL injection]

Date: 2015/05/30

Exploit Author: Panagiotis Vagenas

Contact: https://twitter.com/panVagenas

Vendor Homepage: http://usersultra.com

Software Link: https://wordpress.org/plugins/users-ultra/

Version: 1.5.15

Tested on: WordPress 4.2.2

Category: webapps

CVE: CVE-2015-4109

One can perform an SQL injection attack simply by exploiting wp_ajax_nopriv_rating_vote action.
POST parameters data_target and data_vote can be used to execute arbitrary SQL commands in the database.

In the following PoC we change the administrators password to '1' so a malicious user can then login as the administrator, taking full control of the website.

Note that we assume that table name prefix is 'wp' and administrators user id is 1, a very common scenario.

  • Timeline
    2015-05-29 Discovered
    2015-05-30 Vendor notified via contact form
    2015-06-01 Vendor notified via email
    2015-06-02 Vendor notified via support forums at wordpress.org
    2015-06-02 Vendor responded
    2015-06-04 Fix released in version 1.5.16