# CleanTalk 5.153.4之前的版本中Spam保护、AntiSpam、FireWall的时间盲SQL注入漏洞
## 漏洞概述
在CleanTalk WordPress插件的Spam保护、AntiSpam和防火墙功能中,存在一个未认证的时间盲SQL注入漏洞。
## 影响版本
版本5.153.4之前的版本受此漏洞影响。
## 漏洞细节
在`lib/Cleantalk/ApbctWP/Firewall/SFW.php`文件中的`update_log`函数中,存在一个可以通过User-Agent Header注入的易受攻击的查询。攻击者可以通过操纵由该插件设置的cookie来利用此漏洞,首先发送一个请求以获取`ct_sfw_pass_key` cookie,然后手动设置并禁止重置`ct_sfw_passed` cookie。
## 漏洞影响
此漏洞允许未经认证的攻击者执行时间盲SQL注入,可能泄露敏感信息。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset. | https://github.com/projectdiscovery/nuclei-templates/blob/main/passive/cves/2022/CVE-2021-24295.yaml | POC详情 |
| 2 | It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset. | https://github.com/projectdiscovery/nuclei-templates/blob/main/passive/cves/2021/CVE-2021-24295.yaml | POC详情 |
| 3 | It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-24295.yaml | POC详情 |
暂无评论