Lucene search

K
wpvulndbUtkarsh AgrawalWPVDB-ID:8189AFC4-17B3-4696-89E1-731011CB9E2B
HistoryAug 14, 2023 - 12:00 a.m.

Orders Tracking for WooCommerce < 1.2.6 - Admin+ Arbitrary File Access/Read

2023-08-1400:00:00
Utkarsh Agrawal
wpscan.com
6
woocommerce
arbitrary file access
traversal attack

AI Score

3.6

Confidence

High

EPSS

0.001

Percentile

23.9%

Description The plugin doesn’t validate the file_url parameter when importing a CSV file, allowing high privilege users with the manage_woocommerce capability to access any file on the web server via a Traversal attack. The content retrieved is however limited to the first line of the file.

PoC

As an admin, open the following URL https://example.com/wp-admin/admin.php?page=woo-orders-tracking-import-csv&amp;step;=mapping&amp;file;_url=/etc/passwd Change the file_url parameter to a file on the web server and observe that the plugin will display the first line of the file in each of the “Column name” dropdowns.

AI Score

3.6

Confidence

High

EPSS

0.001

Percentile

23.9%

Related for WPVDB-ID:8189AFC4-17B3-4696-89E1-731011CB9E2B