Lucene search

K
wpvulndbNguyen Duy Quoc KhanhWPVDB-ID:0C9F22E0-1D46-4957-9BA5-5CCA78861136
HistoryNov 07, 2022 - 12:00 a.m.

Checkout Field Editor for WooCommerce < 1.8.0 - Admin+ PHP Object Injection

2022-11-0700:00:00
Nguyen Duy Quoc Khanh
wpscan.com
25
woocommerce
php object injection
admin privileges

0.001 Low

EPSS

Percentile

43.1%

The plugin unserialize user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present

PoC

To simulate a gadget chain, put the following code in a plugin class Evil { public function __wakeup() : void { die(“Arbitrary deserialization”); } } Then import the following payload via WooCommerce > Checkout Form > Advanced Settings > Backup and Import Settings: Tzo0OiJFdmlsIjowOnt9Ow== Tzo0OiJFdmlsIjowOnt9Ow== being the base64 encode of serialized object: O:4:“Evil”:0:{};

CPENameOperatorVersion
woo-checkout-field-editor-prolt1.8.0

0.001 Low

EPSS

Percentile

43.1%

Related for WPVDB-ID:0C9F22E0-1D46-4957-9BA5-5CCA78861136