SB2016020401 - Multiple vulnerabilities in eShop plugin for WordPress



SB2016020401 - Multiple vulnerabilities in eShop plugin for WordPress

Published: February 4, 2016

Security Bulletin ID SB2016020401
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Multiple SQL injections (CVE-ID: CVE-2016-0769)

The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via "delid", "view",  "mark", and "change" parameters within eShop plugin 6.3.14 for WordPress. A remote authenticated attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.

Note: vulnerability in "delid" parameter can be exploited by administrators only.


2) Cross-site scripting (XSS) (CVE-ID: CVE-2016-0765)

Vulnerability allows a remote attacker to perform XSS attacks.

The vulnerability is caused by an input validation error in eshop-orders.php in the eShop plugin 6.3.14 for WordPress when processing the "page" or "action" parameters. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Install update from vendor's website.