This repository has been archived by the owner on Feb 23, 2024. It is now read-only.
Arbitrary SQL (SQL injection) possible via the Store API component.
Package
Affected versions
>= 2.5.0
Patched versions
5.5.1, 5.4.1, 5.3.2, 5.2.1, 5.1.1, 5.0.1, 4.9.2, 4.8.1, 4.7.1, 4.6.1, 4.5.3, 4.4.3, 4.3.1, 4.2.1, 4.1.1, 4.0.1, 3.9.1, 3.8.1, 3.7.2, 3.6.1, 3.5.1, 3.4.1, 3.3.1, 3.2.1, 3.1.1, 3.0.1, 2.9.1, 2.8.1, 2.7.2, 2.6.2, 2.5.16
Impact
This impacts all WooCommerce sites running 2.5.0 or later of the WooCommerce Blocks feature plugin. Via a carefully crafted URL, an exploit can be executed against the
wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]
endpoint that allows the execution of a read only sql query.Supporting Material/References:
Query 1 returns:
Query 2 returns:
Patches
Workarounds
There are no workarounds for this.
References
A8C SIRT: p3btAN-1ve-p2 (internal)
Followup: pcShBQ-4q-p2 (internal)
Public Disclosure: https://woocommerce.com/posts/critical-vulnerability-detected-july-2021/
Credit
https://hackerone.com/jl-dos?type=user