Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

WordPress Plugin SQl Injection Exposes 1M Sites to Cyber Attack

admin by admin
Apr 4, 2024
in News
A A
0

Over a million WordPress websites have been at risk due to a critical SQL Injection vulnerability discovered in the popular LayerSlider plugin.

The flaw, CVE-2024-2879, could allow unauthenticated attackers to extract sensitive data, including password hashes, from websites’ databases.

The vulnerability, tracked under the identifier CVE-2024-2879, has been assigned a CVSS score of 9.8, categorizing it as critical.

Document

Run Free ThreatScan on Your Mailbox

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .


The Common Vulnerability Scoring System (CVSS) score reflects the severity of the risk, with this particular score indicating that the vulnerability could have a devastating impact on affected websites.

The security flaw was responsibly reported by a researcher named AmrAwad through the Wordfence Bug Bounty Program.

AmrAwad’s diligent work earned them a bounty of $5,500.00, marking the highest payout in the program’s history.

The discovery underscores the importance of collaborative efforts between security researchers and companies to enhance the security of the web.

A recent tweet from Wordfence shared that the SQL Injection vulnerability in the LayerSlider plugin was disclosed.

SQL Injection vuln in LayerSlider #WordPress plugin disclosed. Wordfence users secured by our built-in SQL Injection protection. Kudos to the researcher who earned a $5,500 bounty through our Bug Bounty Program. Update your site to patched version 7.10.1. https://t.co/X7X6yxwkYb

— Wordfence (@wordfence) April 2, 2024

Technical Breakdown

The technical analysis of the vulnerability revealed that the LayerSlider plugin versions 7.9.11 to 7.10.0 were susceptible to SQL Injection via the ls_get_popup_markup action.

function ls_get_popup_markup() {

    $id     = is_numeric( $_GET['id'] ) ? (int) $_GET['id'] : $_GET['id'];

    $popup = LS_Sliders::find( $id );

    if( $popup ) {

        $GLOBALS['lsAjaxOverridePopupSettings'] = true;

        $parts  = LS_Shortcode::generateSliderMarkup( $popup );

        die( $parts['container'].$parts['markup'].'<script>'.$parts['init'].'</script>' );

    }

    die();

}

The flaw stemmed from insufficient escaping of user-supplied parameters and inadequate preparation of SQL queries.

The vulnerable code snippet, as detailed in the Wordfence report, shows how the id parameter could be manipulated if not a number, leading to the potential for SQL injection.

Swift Response and Patch Release

Upon notification of the vulnerability, the Kreatura Team, developers of LayerSlider, responded promptly.

They released a patch within two days, with the updated version 7.10.1 addressing the security issue. Users are urged to update their sites with this latest version as soon as possible to mitigate the risk.

Wordfence has assured its users, including those with Premium, Care, and Response plans and those using the free version of the plugin, that they are protected against exploits targeting this vulnerability.

The Wordfence firewall’s built-in SQL Injection protection is designed to detect and block malicious SQL queries.

Wordfence Firewall Protection
Wordfence Firewall Protection

The SQL Injection vulnerability within LayerSlider posed a significant threat to over a million WordPress sites. However, a crisis was averted thanks to the quick actions of the security researcher and the Kreatura Team.

It is a stark reminder of maintaining up-to-date security measures on all web platforms.

WordPress users are encouraged to check their sites and ensure they run the fully patched version of LayerSlider. Sharing this advisory with others who use the plugin is also recommended to help maintain a secure web environment.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.