WordPress Cart66 Lite plug-in Security Restriction Bypass and SQL Injection Vulnerability
Release date:
Updated on:
Affected Systems:
WordPress Cart66 Lite 1.5.3
Description:
Cart66 Lite plug-in WordPress's e-shopping cart plug-in.
WordPress Cart66 Lite 1.5.3 and earlier versions when "action" is set to "promotionProductSearch", the "q" POST parameter value for wp-admin/admin-ajax.php is not properly filtered, attackers can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This plug-in does not properly restrict "Cart66Ajax: saveSettings () "function (wp-content/plugins/cart66-lite/models/Cart66Ajax. php.
<* Source: g0blin
Link: http://secunia.com/advisories/61942/
*>
Suggestion:
Vendor patch:
WordPress
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://wordpress.org/plugins/cart66-lite/
WordPress Cart66 Lite Plugin:
Https://wordpress.org/plugins/cart66-lite/changelog/
Https://plugins.trac.wordpress.org/changeset/1052064/cart66-lite
G0blin:
Https://research.g0blin.co.uk/g0blin-00022/
This article permanently updates the link address: