Rewterz Threat Advisory – CVE-2020-15781 – ICS:Siemens SICAM A8000 RTUs
August 24, 2020Rewterz Threat Alert – DarkSide: New targeted ransomware attacking organizations
August 24, 2020Rewterz Threat Advisory – CVE-2020-15781 – ICS:Siemens SICAM A8000 RTUs
August 24, 2020Rewterz Threat Alert – DarkSide: New targeted ransomware attacking organizations
August 24, 2020Severity
High
Analysis Summary
There are SQLi and unauthenticated stored XSS vulnerabilities in Discount Rules for WooCommerce WordPress plugin. The Discount Rules for WooCommerce plugin (versions 2.0.2 and below) suffers from multiple vulnerabilities such as SQL injection, authorization issues and unauthenticated stored cross-site scripting.
The Vulnerability
The issues in this plugin are caused due to a lack of authorization and nonce token check. The plugin registers several AJAX actions of which one, wp_ajax_wdr_ajax, handles a bulk of different AJAX actions which are supposedly only be accessed by administrators.this AJAX action is also registered as wp_ajax_nopriv_wdr_ajax. Even if wp_ajax_nopriv_wdr_ajax was not registered, authenticated users could still exploit this since wp_ajax_wdr_ajax does not perform any type of authorization or CSRF check.
Impact
- SQL injection
- Cross-site scripting
Indicators of Compromise
IP
45[.]140.167.17
Affected Vendors
WordPress
Affected Products
The Discount Rules for WooCommerce plugin versions 2.0.2 and below
Remediation
Users are advised to update to version 2.1.0 , which can be found here.