By LBT Technology Group, LLC. on Wednesday, 17 April 2024
Category: Security

LayerSlider SQL injection vulnerability

Threat update

An unauthenticated Structured Query Language (SQL) injection vulnerability, known as CVE-2024-2879, has been found in the WordPress plugin LayerSlider.

Technical Detail and Additional Info

What is the threat?

The vulnerability is found in LayerSlider WordPress plugin versions 7.9.11 and 7.10.0. It has a CVSS score of 9.8 and could be susceptible to SQL injection through the ls_get_popup_markup action. It is caused by insufficient escaping on the user-supplied parameter and the absence of wpdb::prepare(). Due to this, unauthenticated attackers can add new SQL queries to ones that already exist. They can also retrieve sensitive data like password hashes from the database.

In this vulnerability, the ls_get_popup_markup action of the plugin was impacted and by using the 'id' argument to define "id," the plugin can query slider markup for popups. If the parameter includes no specific number, the plugin will pass the query without doing any sanitization, eventually allowing SQL injection. 

Why is it noteworthy?

 SQL injection attacks are one of the oldest and most dangerous web application vulnerabilities. SQL injection exploit is successful, it can read sensitive data from the database. It can also alter database data (insert/update/delete), perform database administration tasks like stopping the database management system (DBMS), retrieve the contents of a specific file that is located on the DBMS file system, and occasionally even send commands to the operating system. The query's structure restricts the attack surface to a time-based strategy. Thus, requiring an adversary to track the duration of each request's response to obtain database data.

What is the exposure or risk?

Over 40 percent of websites use WordPress to power their websites, e-commerce applications, and communities. There are more than 1,000,000 WordPress sites installed with LayerSlider due to its ease of use to create visually appealing websites. Considering the content management system's widespread use across the Internet, it raises concerns about the significant security risk. 

What are the recommendations?

 LBT Technology Group recommends the following actions to stay protected against this vulnerability:

References

 For more in-depth information about the recommendations, please visit the following links:

If you have any questions, please contact LBT's Sales Engineer.

Related Posts

Leave Comments