CVE-2020-13921: SkyWalking SQL Injection

日期: 2025-09-01 | 影响软件: SkyWalking | POC: 已公开

漏洞描述

SkyWalking SQL Injection fofa: app="APACHE-Skywalking"

PoC代码[已公开]

id: CVE-2020-13921

info:
  name: SkyWalking SQL Injection
  author: zan8in
  severity: high
  verified: true
  description: |
    SkyWalking SQL Injection
    fofa: app="APACHE-Skywalking"
  reference:
    - https://github.com/apache/skywalking/pull/4639
  tags: cve,cve2020,sqli,skywalking,apache
  created: 2024/04/18

rules:
  r0:
    request:
      method: POST
      path: /graphql
      headers:
        Content-Type: application/json
      body: |
        {"query":"query version { version }","variables":{}}
    expression: response.status == 200 && response.body.bcontains(b'"data":') && response.body.bcontains(b'"version":')
    output:
      search: '"\"version\":\"(?P<version>[0-9]{1,2}\\.[0-9]{1,2}(\\.[0-9]{1,2})?)".bsubmatch(response.body)'
      version: search["version"]
expression: |
  r0() && 
  (versionCompare(string(version),"<","7.0.0") ||
      (versionCompare(string(version),">","6.0.0") && versionCompare(string(version),"<","6.6.0")) ||
      (versionCompare(string(version),">","8.0.0") && versionCompare(string(version),"<","8.0.1")))

相关漏洞推荐