Wordpress admin-ajax.php远程SQL注入漏洞 CVE-2007-2821 CNNVD-200705-427

7.5 AV AC AU C I A
发布: 2007-05-22
修订: 2018-10-16

WordPress是一款免费的论坛Blog系统。 WordPress实现上存在输入验证漏洞,远程攻击者可能利用此漏洞执行SQL注入攻击非授权访问数据库。 WordPress的wp-admin/admin-ajax.php文件没有正确验证对cookie参数的输入。在wp-admin/admin-ajax.php的6行: ------------------[source code]---------------------- define(\'\'DOING_AJAX\'\', true); check_ajax_referer(); if ( !is_user_logged_in() ) die(\'\'-1\'\'); ------------------[/source code]---------------------- 然后在check_ajax_referer()函数中: ------------------[source code]---------------------- function check_ajax_referer() { $cookie = explode(\'\'; \'\', urldecode(empty($_POST[\'\'cookie\'\']) ? $_GET[\'\'cookie\'\'] : $_POST[\'\'cookie\'\'])); // AJAX scripts must pass cookie=document.cookie foreach ( $cookie as $tasty ) { if ( false !== strpos($tasty, USER_COOKIE) ) $user = substr(strstr($tasty, \'\'=\'\'), 1); if ( false !== strpos($tasty, PASS_COOKIE) ) $pass = substr(strstr($tasty, \'\'=\'\'), 1); } if ( !wp_login( $user, $pass, true ) ) die(\'\'-1\'\'); ------------------[/source code]----------------------...

0%
当前有1条漏洞利用/PoC
当前有1条受影响产品信息