vendor:
Ultimate Product Catalogue
by:
Felipe Molina de la Torre
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Ultimate Product Catalogue
Affected Version From: 3.1.2002
Affected Version To: 3.1.2002
Patch Exists: YES
Related CWE: Requested to mitre but not assigned yet
CPE: a:etoile_web_design:ultimate_product_catalogue
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux 2.6, PHP 5.3 with magic_quotes_gpc turned off, Apache 2.4.0 (Ubuntu)
2015
Unauthenticated SQLi in Item_ID POST parameter on Ultimate Product Catalogue wordpress plugin
Ultimate Product Catalogue is a responsive and easily customizable plugin for all your product catalogue needs. It has +59.000 downloads, +3.000 active installations. Unauthenticated SQL injection in ajax call when the plugin is counting the times a product is being seen by the web visitors. The vulnerable POST parameter is "Item_ID". In file Functions/Process_Ajax.php line 67, the code is "$Item_ID = $_POST['Item_ID']; $Item = $wpdb->get_row("SELECT Item_Views FROM $items_table_name WHERE Item_ID=" . $Item_ID);" and the proof of concept is "POST /wp-admin/admin-ajax.php HTTP/1.1 Host: <wordpress host> [...] Cookie: wordpress_f305[...] Item_ID=2 AND SLEEP(5)&action=record_view".
Mitigation:
Update to version 3.1.3