WordPress WP E-Commerce 3.8.9 SQL Injection / Cross Site Scripting
Software: WP e-Commerce
Software Language: PHP
Version: 3.8.9 and below
Vendor Status: Vendor contacted
Release Date: 2012-11-12
Risk: High
1. General Overview
===================
During the security audit of WP E-Commerce plugin for WordPress CMS,
multiple vulnerabilities were discovered using DefenseCode ThunderScan
PHP web application source code security analysis platform.
More information about ThunderScan PHP is available at URL:
http://www.defensecode.com/subcategory/thunderscan-8
Detailed report for each vulnerability can be found in the following PDF
report:
http://www.defensecode.com/public/wp-e-commerce_security_audit_final_report.pdf
Report has been generated by ThunderScan PHP Web Application Source Code
Security Analysis.
2. Software Overview
===================
WP e-Commerce is a popular e-commerce plugin for WordPress. Users can
use it to to sell products, downloads or services online. It has more
than 2 Million downloads on wordpress.org.
Homepage:
http://wordpress.org/extend/plugins/wp-e-commerce/
http://getshopped.org/
3. Brief Vulnerability Description
==================================
During the security analysis, ThunderScan PHP discovered multiple SQL
Injection and Cross Site Scripting vulnerabilities in WP e-Commerce plugin.
3.1. SQL injection
File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
Function: get_results($sql)
Variable: $_POST['view_purchlogs_by_status']
Called from (function line file):
get_purchlogs() 699 wp-e-commerce\wpsc-core\wpsc-deprecated.php
3.2 SQL injection
File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
Function: get_results( $sql )
Variable: $_POST['view_purchlogs_by_status']
Called from (function line file):
get_purchlogs() 681 wp-e-commerce\wpsc-core\wpsc-deprecated.php
3.3 SQL injection
File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
Function: get_results( $sql )
Variable: $_GET['view_purchlogs_by_status']
Called from (function line file):
get_purchlogs() 525 wp-e-commerce\wpsc-includes\purchaselogs.class.php
3.4 SQL injection
File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
Function: get_results( $sql )
Variable: $_GET['view_purchlogs_by_status']
Called from (function line file):
get_purchlogs() 543 wp-e-commerce\wpsc-includes\purchaselogs.class.php
3.5 SQL injection
File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
Function: get_results( $sql )
Variable: $_GET['view_purchlogs_by_status']
Called from (function line file):
get_purchlogs() 534 wp-e-commerce\wpsc-includes\purchaselogs.class.php
3.6 SQL injection
File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
Function: get_results( $sql )
Variable: $_POST['view_purchlogs_by_status']
Called from (function line file):
get_purchlogs() 689 wp-e-commerce\wpsc-core\wpsc-deprecated.php
3.7 Cross-Site Scripting
File: wp-e-commerce\wpsc-admin\includes\purchase-log-list-ta
ble-class.php
Function: echo ('<input type="hidden" name="m" value="' . $m . '" />')
Variable: $_REQUEST['m']
4. Solution
===========
Vendor resolved security issues in latest WP e-Commerce release. All
users are strongly advised to update WP e-Commerce plugin to the latest
available version 3.8.9.1.
# 1337day.com [2012-11-19]
Home
»
Exploit
»
SQL Injection
»
WordPress
»
XSS
» WordPress WP E-Commerce 3.8.9 SQL Injection / Cross Site Scripting
Subscribe to:
Post Comments (Atom)
Post Labels
- .htaccess
- 0-day
- Add-on
- AutoIT
- BackConnect
- BackDoor
- BackTrack
- Blogger
- Blogger Template
- Botnet
- Brute
- Bypass
- CEH
- CGI
- Checked
- Chrome
- Code
- Code RIP
- cPanel
- Crack
- CSRF
- CSS
- DDoS
- Decode
- DNS
- dork
- Drupal
- Ebook
- ebook hacking
- Encryption
- Exploit
- FireFox
- Flood
- Get Root
- GHDB
- Gmail
- Hacker
- hacker os
- Hacking and Security
- Hacking Tools
- HTML
- HTML5
- Infographic
- Internet Explorer
- IT News
- J2TeaM
- J2TeaM Tools
- Java
- JavaScript
- Javascript Injection
- Joomla
- keylog
- Lab Hack
- Linux
- Local Attack
- Local File Include
- Malware
- Metasploit
- Microsoft
- MyBB
- MySQL
- Network
- newbie
- newbie area vhb
- Oracle
- Password
- Path Disclosure
- Pen-Test
- Perl
- Phishing
- PHP
- Plugin
- Programming
- Python
- Remote Code Execution
- Remote Desktop
- Remote File Include
- Reverse
- Scanner
- Security
- SEO
- Shell
- Social Engineering
- Software
- SQL Injection
- Symlink
- Tản mạn
- thiet ke web
- Thủ Thuật
- Thủ thuật blog
- Tips
- Tools
- Tricks
- TUTORIALS
- Upload
- vBulletin
- vhb
- Vietnamese ebook
- Virus
- Vulnerability
- Web Developer
- WHMCS
- WiFi
- Windows
- WordPress
- Write-up
- XSS
- Yahoo
- Youtube
Post a Comment