module

WordPress Google Maps Plugin SQL Injection

Disclosed
2019-04-02
Created
2019-04-22

Description

This module exploits a SQL injection vulnerability in a REST endpoint
registered by the WordPress plugin wp-google-maps between 7.11.00 and
7.11.17 (included).

As the table prefix can be changed by administrators, set DB_PREFIX
accordingly.

Author

Thomas Chauchefoin (Synacktiv)

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/admin/http/wp_google_maps_sqli
msf auxiliary(wp_google_maps_sqli) > show actions
...actions...
msf auxiliary(wp_google_maps_sqli) > set ACTION < action-name >
msf auxiliary(wp_google_maps_sqli) > show options
...show and set options...
msf auxiliary(wp_google_maps_sqli) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.