A blind-based SQL injection vulnerability exists in the SP Client Document Manager plugin for WordPress. An attacker is able to inject SQL statements into four vulnerable functions via unsanitized parameters, resulting in the ability to run arbitrary SQL queries on the backend DB.
Exploitation
Stages
- An attacker sends a crafted request to ‘ajax.php’ with SQL injection contained in a call to one of four vulnerable functions.
- The injected SQL statement is passed to the backend database with no output returned (blind-based-injection).
Prerequisites
You will need the WordPress installation with plugin ‘SP Client Document Manager’ versions 2.4.1 and earlier.
Vulnerability Description
A blind-based SQL injection vulnerability exists in the ajax.php script used in the SP Client Document Manager plugin for WordPress. This vulnerability is present in versions 2.4.1 and earlier. An attacker is able to inject SQL statements into four vulnerable functions via unsanitized parameters, resulting in the ability to run arbitrary SQL queries on the backend DB.
Alert Logic Coverage
Alert Logic® has evaluated its customer base for exposure to the exploit and has developed signatures for mitigating the threat depending on the security service in place.
The Network-Based Intrusion Detection System (IDS) has been updated with the new signatures for this exploit when detected via Alert Logic Threat Manager™. If this signature is detected, an incident is generated in the Alert Logic console.
Detection of this threat is provided via Alert Logic ActiveWatch for Web Security Manager service. Depending on your deployment of Web Security Manager, you will receive an incident (for out-of-band deployment) or the threat will be actively blocked and rejected (for the inline Web Security Manager Premier deployment) if an exploit attempt is observed.
Recommendations for Mitigation
Upgrade the plugin to non-vulnerable version.
Comments
0 comments
Please sign in to leave a comment.