WordPress WassUp插件spy.php脚本远程SQL注入漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

BUGTRAQ ID: 27525 WordPress是一款免费的论坛Blog系统。 WordPress的WassUp插件存在输入验证漏洞,远程攻击者可能利用此漏洞执行SQL注入攻击。 WordPress的WassUp插件中spy.php文件没有正确地验证对to_date参数的输入: # if (isset($_GET['to_date'])) $to_date = htmlentities(strip_tags($_GET['to_date'])); # ........... # spyview($from_date,$to_date,$rows); # # -In main.php # # function spyview ($from_date=&quot;&quot;,$to_date=&quot;&quot;,$rows=&quot;999&quot;) { # ........... # $qryC = $wpdb-&gt;get_results(&quot;SELECT id, wassup_id, max(timestamp) as max_timestamp, ip, hostname, searchengine, # urlrequested, agent, referrer, spider, username, comment_author FROM $table_name WHERE timestamp BETWEEN $from_date AND # $to_date GROUP BY id ORDER BY max_timestamp DESC&quot;); 这允许远程攻击者通过注入任意SQL代码控制SQL查询。 WordPress WassUp 1.4 - 1.4.3 厂商补丁: WordPress --------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://wordpress.org/ target=_blank>http://wordpress.org/</a>

0%
暂无可用Exp或PoC
当前有0条受影响产品信息