The favored WooCommerce Sq. plugin for WordPress vulnerability permits unauthenticated attackers to uncover bank cards on file and make fraudulent prices. The vulnerability impacts as much as 80,000 installations.
WooCommerce Sq. WordPress Plugin
The WooCommerce Sq. plugin permits WordPress websites to simply accept funds by the Sq. POS, in addition to synchronize product stock information between Sq. and WooCommerce. Sq. plugin permits a WooCommerce service provider to help funds by Apple Pay®, Google Pay, WooCommerce Pre-Orders, and WooCommerce Subscriptions.
Insecure Direct Object Reference
The vulnerability within the plugin arises from an Insecure Direct Object Reference (IDOR) vulnerability, a flaw that occurs when vital information is uncovered in URL file parameters, equivalent to identification numbers, which then permits an attacker to govern that information with out correct entry that may usually forestall them from accessing these recordsdata.
The Open Worldwide Software Safety Venture (OWASP) defines IDOR as:
“Insecure Direct Object Reference (IDOR) is a vulnerability that arises when attackers can entry or modify objects by manipulating identifiers utilized in an online utility’s URLs or parameters. It happens as a consequence of lacking entry management checks, which fail to confirm whether or not a consumer ought to be allowed to entry particular information.”
Exploiting the vulnerability doesn’t require that the attacker purchase any degree of authentication or permission ranges, making it simpler for them to launch an assault on affected web sites.
In accordance with a Wordfence advisory:
“The WooCommerce Sq. plugin for WordPress is weak to Insecure Direct Object Reference in all variations as much as, and together with, 5.1.1 by way of the get_token_by_id operate as a consequence of lacking validation on a consumer managed key. This makes it doable for unauthenticated attackers to reveal arbitrary Sq. “ccof” (bank card on file) values and leverage this worth to probably make fraudulent prices on the goal web site.”
There are a number of variations of the WooCommerce Sq. plugin which might be patched, it’s really helpful that customers of the plugin replace to not less than one of many following variations:
- 4.2.3
- 4.3.2
- 4.4.2
- 4.5.2
- 4.6.4
- 4.7.4
- 4.8.8
- 4.9.9
- 5.0.1
- 5.1.2
The CVSS severity vulnerability rating is rated at 7.5, indicating it’s a harmful vulnerability that may be remotely exploitable however is mitigated by a constraint that retains it from being rated as “Important.”
Featured Picture by Shutterstock/IgorZh
