WordPress WP E-Commerce 3.8.9 SQL Injection / Cross Site Scripting

2012.11.14
Credit: DefenseCode
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89
CWE-79

DefenseCode ThunderScan PHP Advisory: Wordpress WP E-Commerce Plugin Multiple Security Vulnerabilities Advisory ID: DC-2012-11-001 Advisory Title: Wordpress WP E-Commerce Plugin Multiple Vulnerabilities Advisory URL: http://www.defensecode.com/article/wordpress_wp_e-commerce_plugin_multiple_security_vulnerabilities_-30 Software: WP e-Commerce Software Language: PHP Version: 3.8.9 and below Vendor Status: Vendor contacted Release Date: 2012-11-12 Risk: High 1. General Overview =================== During the security audit of WP E-Commerce plugin for WordPress CMS, multiple vulnerabilities were discovered using DefenseCode ThunderScan PHP web application source code security analysis platform. More information about ThunderScan PHP is available at URL: http://www.defensecode.com/subcategory/thunderscan-8 Detailed report for each vulnerability can be found in the following PDF report: http://www.defensecode.com/public/wp-e-commerce_security_audit_final_report.pdf Report has been generated by ThunderScan PHP Web Application Source Code Security Analysis. 2. Software Overview =================== WP e-Commerce is a popular e-commerce plugin for WordPress. Users can use it to to sell products, downloads or services online. It has more than 2 Million downloads on wordpress.org. Homepage: http://wordpress.org/extend/plugins/wp-e-commerce/ http://getshopped.org/ 3. Brief Vulnerability Description ================================== During the security analysis, ThunderScan PHP discovered multiple SQL Injection and Cross Site Scripting vulnerabilities in WP e-Commerce plugin. 3.1. SQL injection File: wp-e-commerce\wpsc-includes\purchaselogs.class.php Function: get_results($sql) Variable: $_POST['view_purchlogs_by_status'] Called from (function line file): get_purchlogs() 699 wp-e-commerce\wpsc-core\wpsc-deprecated.php 3.2 SQL injection File: wp-e-commerce\wpsc-includes\purchaselogs.class.php Function: get_results( $sql ) Variable: $_POST['view_purchlogs_by_status'] Called from (function line file): get_purchlogs() 681 wp-e-commerce\wpsc-core\wpsc-deprecated.php 3.3 SQL injection File: wp-e-commerce\wpsc-includes\purchaselogs.class.php Function: get_results( $sql ) Variable: $_GET['view_purchlogs_by_status'] Called from (function line file): get_purchlogs() 525 wp-e-commerce\wpsc-includes\purchaselogs.class.php 3.4 SQL injection File: wp-e-commerce\wpsc-includes\purchaselogs.class.php Function: get_results( $sql ) Variable: $_GET['view_purchlogs_by_status'] Called from (function line file): get_purchlogs() 543 wp-e-commerce\wpsc-includes\purchaselogs.class.php 3.5 SQL injection File: wp-e-commerce\wpsc-includes\purchaselogs.class.php Function: get_results( $sql ) Variable: $_GET['view_purchlogs_by_status'] Called from (function line file): get_purchlogs() 534 wp-e-commerce\wpsc-includes\purchaselogs.class.php 3.6 SQL injection File: wp-e-commerce\wpsc-includes\purchaselogs.class.php Function: get_results( $sql ) Variable: $_POST['view_purchlogs_by_status'] Called from (function line file): get_purchlogs() 689 wp-e-commerce\wpsc-core\wpsc-deprecated.php 3.7 Cross-Site Scripting File: wp-e-commerce\wpsc-admin\includes\purchase-log-list-ta ble-class.php Function: echo ('<input type="hidden" name="m" value="' . $m . '" />') Variable: $_REQUEST['m'] 4. Solution =========== Vendor resolved security issues in latest WP e-Commerce release. All users are strongly advised to update WP e-Commerce plugin to the latest available version 3.8.9.1. 5. About DefenseCode ThunderScan ================================ DefenseCode ThunderScan products are designed for comprehensive security assessment of web application source code. ThunderScan products are static source code analysis products for comprehensive security audit of web applications. Audit your web applications for SQL Injections, Cross Site Scripting, Code Execution, File Inclusion, and much more. Supported web application languages: ASP.Net C#, VB.Net, Classic ASP, PHP and Java/JSP. ThunderScan: http://www.defensecode.com/subcategory/thunderscan-8 E-mail: defensecode[at]defensecode.com Website: http://www.defensecode.com

References:

http://www.defensecode.com/subcategory/thunderscan-8
http://www.defensecode.com/article/wordpress_wp_ecommerce_plugin_multiple_security_vulnerabilities_-30


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top