WP Fastest Cache <= 0.8.7.4 - Blind SQL Injection



Description
Improper escaping of user input when deleting the cache of specific pages leads to SQL injection vulnerability. esc_sql() was used on input but the result was used unquoted in the constructed SQL query.  
Proof of Concept
Send GET request to "URL/wp-admin/admin-ajax.php?action=wpfc_clear_cache_column&id=1 PAYLOAD" 

Affects Plugin

fixed in version 0.8.7.5

References

URL https://plugins.trac.wordpress.org/changeset/1771828/wp-fastest-cache
URL https://plugins.trac.wordpress.org/changeset/1771564/wp-fastest-cache
URL https://www.ripstech.com/php-security-calendar-2018/#Day21

Classification

Type SQLI
OWASP Top 10 A1: Injection
CWE CWE-89

Miscellaneous

Original Researcher RIPS Technologies
Submitter Karim El Ouerghemmi
Submitter Website https://ripstech.com
Views 4782
Verified No
WPVDB ID 9032

Timeline

Publicly Published 2018-02-22 (over 1 year ago)
Added 2018-02-25 (over 1 year ago)
Last Updated 2019-01-07 (10 months ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin