module

WordPress Google Maps Plugin SQL Injection

Disclosed
04/02/2019
Created
04/22/2019

Description

This module exploits a SQL injection vulnerability in a REST endpoint
registered by the WordPress plugin wp-google-maps between 7.11.00 and
7.11.17 (included).

As the table prefix can be changed by administrators, set DB_PREFIX
accordingly.

Author

Thomas Chauchefoin (Synacktiv)

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

    msf > use auxiliary/admin/http/wp_google_maps_sqli
    msf /(i) > show actions
        ...actions...
    msf /(i) > set ACTION < action-name >
    msf /(i) > show options
        ...show and set options...
    msf /(i) > run
  
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.