一、 漏洞 CVE-2021-24295 基础信息
漏洞信息
                                        # CleanTalk 5.153.4之前的版本中Spam保护、AntiSpam、FireWall的时间盲SQL注入漏洞

## 漏洞概述
在CleanTalk WordPress插件的Spam保护、AntiSpam和防火墙功能中,存在一个未认证的时间盲SQL注入漏洞。

## 影响版本
版本5.153.4之前的版本受此漏洞影响。

## 漏洞细节
在`lib/Cleantalk/ApbctWP/Firewall/SFW.php`文件中的`update_log`函数中,存在一个可以通过User-Agent Header注入的易受攻击的查询。攻击者可以通过操纵由该插件设置的cookie来利用此漏洞,首先发送一个请求以获取`ct_sfw_pass_key` cookie,然后手动设置并禁止重置`ct_sfw_passed` cookie。

## 漏洞影响
此漏洞允许未经认证的攻击者执行时间盲SQL注入,可能泄露敏感信息。
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Time-based Blind SQL Injection in Spam protection, AntiSpam, FireWall by CleanTalk < 5.153.4
来源:美国国家漏洞数据库 NVD
漏洞描述信息
It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
来源:美国国家漏洞数据库 NVD
漏洞标题
WordPress 插件 SQL注入漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
WordPress 插件是WordPress开源的一个应用插件。 CleanTalk WordPress Plugin 5.153.4之前版本存在SQL注入漏洞,该漏洞源于lib/Cleantalk/ApbctWP/Firewall/SFW.php中的更新日志函数包含了一个易受攻击的查询。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
SQL注入
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2021-24295 的公开POC
# POC 描述 源链接 神龙链接
1 It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset. https://github.com/projectdiscovery/nuclei-templates/blob/main/passive/cves/2022/CVE-2021-24295.yaml POC详情
2 It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset. https://github.com/projectdiscovery/nuclei-templates/blob/main/passive/cves/2021/CVE-2021-24295.yaml POC详情
3 It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-24295.yaml POC详情
三、漏洞 CVE-2021-24295 的情报信息
四、漏洞 CVE-2021-24295 的评论

暂无评论


发表评论