一、 漏洞 CVE-2024-27956 基础信息
漏洞信息
                                        # WordPress Automatic 插件 <= 3.92.0 - 无需身份验证的任意 SQL 执行漏洞

## 概述
ValvePress Automatic 存在 SQL 注入漏洞,该漏洞源于在 SQL 命令中未正确中和特殊元素。

## 影响版本
从 n/a 至 3.92.0 版本受到影响。

## 细节
该漏洞允许攻击者通过未正确中和特殊 SQL 元素执行 SQL 注入攻击。

## 影响
漏洞可能导致数据泄露或数据库被篡改。
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
WordPress Automatic plugin <= 3.92.0 - Unauthenticated Arbitrary SQL Execution vulnerability
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L
来源:美国国家漏洞数据库 NVD
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
来源:美国国家漏洞数据库 NVD
漏洞标题
WordPress Plugin WP Automatic SQL注入漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin WP Automatic 存在SQL注入漏洞,该漏洞源于存在 SQL 注入漏洞。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
SQL注入
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2024-27956 的公开POC
# POC 描述 源链接 神龙链接
1 None https://github.com/truonghuuphuc/CVE-2024-27956 POC详情
2 PoC for wordpress takeover in CVE-2024-27956 https://github.com/diego-tella/CVE-2024-27956-RCE POC详情
3 CVE-2024-27956 WORDPRESS RCE PLUGIN https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN POC详情
4 None https://github.com/FoxyProxys/CVE-2024-27956 POC详情
5 CVE-2024-27956 https://github.com/k3ppf0r/CVE-2024-27956 POC详情
6 CVE-2024-27956 RCE POC WordPress https://github.com/nancyariah4/CVE-2024-27956 POC详情
7 WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956 POC详情
8 None https://github.com/W3BW/CVE-2024-27956-RCE-File-Package POC详情
9 WordPress Automatic Plugin <= 3.92.0 - SQL Injection https://github.com/Cappricio-Securities/CVE-2024-27956 POC详情
10 None https://github.com/itzheartzz/MASS-CVE-2024-27956 POC详情
11 Valve Press - CVE-2024-27956-RCE - SQL Injection https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE POC详情
12 None https://github.com/cve-2024/CVE-2024-27956-RCE POC详情
13 Perform with massive Wordpress SQLI 2 RCE https://github.com/ThatNotEasy/CVE-2024-27956 POC详情
14 None https://github.com/CERTologists/EXPLOITING-CVE-2024-27956 POC详情
15 Yaml PoC rule for fscan. https://github.com/7aRanchi/CVE-2024-27956-for-fscan POC详情
16 The Automatic plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.92.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-27956.yaml POC详情
17 Attacks a vulnerable WordPress site with the wp-automatic plugin. Inserts a new user called eviladmin directly into the database (INSERT INTO wp_users). Searches for the ID of the newly created user (cyclic SELECT). Promotes eviladmin to Administrator (INSERT INTO wp_usermeta). https://github.com/m4nInTh3mIdDle/wordpress-CVE-2024-27956 POC详情
18 CVE-2024-27956 - WP Automatic SQL Injection Exploit Tool https://github.com/devsec23/CVE-2024-27956 POC详情
三、漏洞 CVE-2024-27956 的情报信息