Multiple SQL injections in eShop plugin for WordPress - CVE-2016-0769

 

Multiple SQL injections in eShop plugin for WordPress - CVE-2016-0769

Published: January 23, 2017 / Updated: January 24, 2017


Vulnerability identifier: #VU5286
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-0769
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Richard Pedley
Affected software:
eShop plugin for WordPress

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via "delid", "view",  "mark", and "change" parameters within eShop plugin 6.3.14 for WordPress. A remote authenticated attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.

Note: vulnerability in "delid" parameter can be exploited by administrators only.


How to mitigate CVE-2016-0769

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.


Sources