WP Fastest Cache <= 0.8.7.4 - Blind SQL Injection



Description
Improper escaping of user input when deleting the cache of specific pages leads to SQL injection vulnerability. esc_sql() was used on input but the result was used unquoted in the constructed SQL query.  
Proof of Concept
Send GET request to "URL/wp-admin/admin-ajax.php?action=wpfc_clear_cache_column&id=1 PAYLOAD" 

Affects Plugin

fixed in version 0.8.7.5

References

URL https://plugins.trac.wordpress.org/changeset/1771828/wp-fastest-cache
URL https://plugins.trac.wordpress.org/changeset/1771564/wp-fastest-cache

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Submitter Karim El Ouerghemmi
Submitter Website https://ripstech.com
Views 1422
Verified No
WPVDB ID 9032

Timeline

Publicly Published 2018-02-22 (10 months ago)
Added 2018-02-25 (10 months ago)
Last Updated 2018-02-25 (10 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.