WordPress Plugin CP Multi View Event Calendar 1.1.7 - SQL Injection

EDB-ID:

37560

CVE:





Platform:

PHP

Date:

2015-07-10


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

# Exploit Title: WordPress cp-multi-view-calendar.1.1.7  [Unauthenticated SQL injection vulnerabilities]
# Date: 2015-07-10
# Google Dork: Index of /wordpress/wp-content/plugins/cp-multi-view-calendar
# Exploit Author: Joaquin Ramirez Martinez [ i0akiN SEC-LABORATORY ]
# Vendor Homepage: http://wordpress.dwbooster.com/
# Software Link: https://downloads.wordpress.org/plugin/cp-multi-view-calendar.1.1.7.zip
# Version: 1.1.7
# Tested on: windows 7 + sqlmap 0.9. 
# OWASP Top10: A1-Injection


====================
 DESCRIPTION
====================

Multiple SQL Injection vulnerabilities has been detected in the Wordpress cp-multi-view-calendar plugin in version 1.1.7 .
The vulnerability allows remote attackers to inject own sql commands to compromise the affected web-application and connected dbms. 

The SQL Injection vulnerabilities are located in the `edit.php` and `datafeed.php` files.
Remote attackers are able to inject own sql commands to the vulnerable parameters value in these files GET/POST method request.

The remote sql injection web vulnerability can be exploited by remote attackers without privileged application user account 
and without required user interaction. Successful exploitation of the sql injection vulnerability results in application and 
web-service or dbms compromise.

===================
 Severity Level
===================
Critical


=================================
 AFFECTED URLs AND PARAMETER(S)
=================================

http://localhost/wordpress/?action=data_management&cpmvc_do_action=mvparse&f=edit&id=[SQLi]

Vulnerable parameter: `id`

Explotation technique: blind (time-based) , union query based.

-------------------------------------------------------------------

http://localhost/wordpress/?action=data_management&cpmvc_do_action=mvparse&f=datafeed&method=remove&rruleType=del_only&calendarId=[SQLi]

Vulnerable parameter: `calendarId`

Explotation technique: blind (boolean based, time based), error based.

-----------------------------------------------------------------------

http://localhost/wordpress/?action=data_management&cpmvc_do_action=mvparse&f=datafeed&method=adddetails&id=1&calid=[SQLi]

Vulnerable parameter: `calid`

Explotation technique: blind (boolean based, time based)

-----------------------------------------------------------------------


it isn't all sqli vulnerabilities, but these are the vulnerable functions:


In file datafeed.php

-checkIfOverlapping(...) 
-updateDetailedCalendar(...)
-removeCalendar(...)


In file edit.php
 
-getCalendarByRange(...)


   ... I think this is all..


Sorry. I didn't have much time for this report.

==================================

time-line

2015-07-01: vulnerabilities found
2015-07-09: reported to vendor
2015-07-10: 
2015-07-12: 

===================================