SB2016020401 - Multiple vulnerabilities in eShop plugin for WordPress
Published: February 4, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 vulnerabilities.
1) Multiple SQL injections (CVE-ID: CVE-2016-0769)
The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via "delid", "view", "mark", and "change" parameters within eShop plugin 6.3.14 for WordPress. A remote authenticated attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in web application database.
Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.
Note: vulnerability in "delid" parameter can be exploited by administrators only.
2) Cross-site scripting (XSS) (CVE-ID: CVE-2016-0765)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in eshop-orders.php in the eShop plugin 6.3.14 for WordPress when processing the "page" or "action" parameters. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.