lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <50A164AB.8040405@defensecode.com>
Date: Mon, 12 Nov 2012 22:05:47 +0100
From: DefenseCode <defensecode@...ensecode.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: [DC-2012-11-001] DefenseCode ThunderScan PHP
 Advisory: Wordpress WP e-Commerce Plugin Multiple Security Vulnerabilities


DefenseCode ThunderScan PHP Advisory: Wordpress WP E-Commerce Plugin
Multiple Security Vulnerabilities


Advisory ID: DC-2012-11-001
Advisory Title: Wordpress WP E-Commerce Plugin Multiple Vulnerabilities
Advisory URL:
http://www.defensecode.com/article/wordpress_wp_e-commerce_plugin_multiple_security_vulnerabilities_-30
Software: WP e-Commerce
Software Language: PHP
Version: 3.8.9 and below
Vendor Status: Vendor contacted
Release Date: 2012-11-12
Risk: High



1. General Overview
===================
During the security audit of WP E-Commerce plugin for WordPress CMS,
multiple vulnerabilities were discovered using DefenseCode ThunderScan
PHP web application source code security analysis platform.
More information about ThunderScan PHP is available at URL:
http://www.defensecode.com/subcategory/thunderscan-8

Detailed report for each vulnerability can be found in the following PDF
report:
http://www.defensecode.com/public/wp-e-commerce_security_audit_final_report.pdf

Report has been generated by ThunderScan PHP Web Application Source Code
Security Analysis.


2. Software Overview
===================
WP e-Commerce is a popular e-commerce plugin for WordPress. Users can
use it to to sell products, downloads or services online. It has more
than 2 Million downloads on wordpress.org.

Homepage:
http://wordpress.org/extend/plugins/wp-e-commerce/
http://getshopped.org/


3. Brief Vulnerability Description
==================================
During the security analysis, ThunderScan PHP discovered multiple SQL
Injection and Cross Site Scripting vulnerabilities in WP e-Commerce plugin.

3.1. SQL injection
   File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
   Function: get_results($sql)
   Variable: $_POST['view_purchlogs_by_status']
   Called from (function line file):
     get_purchlogs() 699 wp-e-commerce\wpsc-core\wpsc-deprecated.php

3.2 SQL injection
   File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
   Function: get_results( $sql )
   Variable: $_POST['view_purchlogs_by_status']
   Called from (function line file):
     get_purchlogs() 681 wp-e-commerce\wpsc-core\wpsc-deprecated.php

3.3 SQL injection
   File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
   Function: get_results( $sql )
   Variable: $_GET['view_purchlogs_by_status']
   Called from (function line file):
     get_purchlogs() 525 wp-e-commerce\wpsc-includes\purchaselogs.class.php

3.4 SQL injection
   File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
   Function:  get_results( $sql )
   Variable: $_GET['view_purchlogs_by_status']
   Called from (function line file):
     get_purchlogs() 543 wp-e-commerce\wpsc-includes\purchaselogs.class.php

3.5 SQL injection
   File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
   Function:  get_results( $sql )
   Variable: $_GET['view_purchlogs_by_status']
   Called from (function line file):
      get_purchlogs() 534 wp-e-commerce\wpsc-includes\purchaselogs.class.php

3.6 SQL injection
   File: wp-e-commerce\wpsc-includes\purchaselogs.class.php
   Function:  get_results( $sql )
   Variable: $_POST['view_purchlogs_by_status']
   Called from (function line file):
      get_purchlogs() 689 wp-e-commerce\wpsc-core\wpsc-deprecated.php

3.7 Cross-Site Scripting
   File: wp-e-commerce\wpsc-admin\includes\purchase-log-list-ta 
ble-class.php
   Function: echo ('<input type="hidden" name="m" value="' . $m . '" />')
   Variable: $_REQUEST['m']


4. Solution
===========
Vendor resolved security issues in latest WP e-Commerce release. All
users are strongly advised to update WP e-Commerce plugin to the latest
available version 3.8.9.1.


5. About DefenseCode ThunderScan
================================
DefenseCode ThunderScan products are designed for comprehensive security
assessment of web application source code. ThunderScan products are
static source code analysis products for comprehensive security audit of
web applications.
Audit your web applications for SQL Injections, Cross Site Scripting,
Code Execution, File Inclusion, and much more.
Supported web application languages: ASP.Net C#, VB.Net, Classic ASP,
PHP and Java/JSP.

ThunderScan: http://www.defensecode.com/subcategory/thunderscan-8
E-mail: defensecode[at]defensecode.com
Website: http://www.defensecode.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ