WordPress Simple:Press 4.3插件value参数SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

BUGTRAQ ID: 41348 WordPress是一款免费的论坛Blog系统。 WordPress所使用的Simple:Press插件没有正确地过滤用户在搜索字段所输入的搜索变量便注入到了SQL查询中使用: sf-header-forum.php ---[snip]--- 385 # Add Search Vars 386 if(isset($_GET['search'])) 387 { 388 if($_GET['search'] != '') $sfvars['searchpage'] = sf_esc_int($_GET['search']); 389 if(isset($_GET['value']) ? $sfvars['searchvalue'] = stripslashes(urldecode($_GET['value'])) : $sfvars['searchvalue'] = ''); 390 if(isset($_GET['type']) ? $sfvars['searchtype'] = sf_esc_int($_GET['type']) : $sfvars['searchtype'] = 1); 400 if(isset($_GET['include']) ? $sfvars['searchinclude'] = sf_esc_int($_GET['include']) : $sfvars['searchinclude'] = 1); 401 if($sfvars['searchinclude'] == 0) $sfvars['searchinclude'] =1; 402 if($sfvars['searchtype'] == 0) $sfvars['searchtype'] =1; 403 } else { ---[snip]--- At the line 389, HTTP GET Request "value" defined as global variable $sfvars['searchvalue'] with filtering functions that stripslashes() and urldecode() but they can't secure it because in...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息