CVE-2022-4237
Welcart e-Commerce < 2.8.6 - Subscriber+ PHAR Deserialisation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Welcart e-Commerce WordPress plugin before 2.8.6 does not validate user input before using it in file_exist() functions via various AJAX actions available to any authenticated users, which could allow users with a role as low as subscriber to perform PHAR deserialisation when they can upload a file and a suitable gadget chain is present on the blog
El complemento Welcart e-Commerce de WordPress anterior a 2.8.6 no valida la entrada del usuario antes de usarlo en funciones file_exist() a través de varias acciones AJAX disponibles para cualquier usuario autenticado, lo que podría permitir a los usuarios con un rol tan bajo como el de suscriptor realizar la deserialización PHAR cuando pueden cargar un archivo y hay una cadena de gadgets adecuada en el blog
The Welcart e-Commerce plugin for WordPress is vulnerable to Information Disclosure due to missing capability checks on the wel_check_progress_ajax AJAX action in versions up to, and including, 2.8.5. This makes it possible for authenticated attackers, with subscriber-level privileges or higher, to read certain log files maintained by the plugin leading to information disclosure. While the log file names are known and are directly accessible via browser on a server that is configured to serve .txt and .log files, the vulnerability allows attackers to access log files on other sites sharing the same server and also provides the ability to read such log files even if direct access is forbidden. Furthermore, the plugin is vulnerable to deserialization of untrusted input via the 'progressfile ' parameter. This makes it possible for attackers to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-11-30 CVE Reserved
- 2022-12-05 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-502: Deserialization of Untrusted Data
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/7a4b790c-49ae-46bc-9544-e188deae243f | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Collne Search vendor "Collne" | Welcart E-commerce Search vendor "Collne" for product "Welcart E-commerce" | < 2.8.6 Search vendor "Collne" for product "Welcart E-commerce" and version " < 2.8.6" | wordpress |
Affected
|