WordPress security: More than 600,000 sites hit by blind SQLi vulnerability in WP Statistics plugin


Adam Bannister

20 May 2021 at 13:33 UTC

Updated: 25 May 2021 at 11:52 UTC

Sensitive database data at risk if webmasters fail to update systems

WordPress security: More than 600,000 sites hit by blind SQLi vulnerability in WP Statistics plugin

UPDATED WP Statistics, a popular web analytics plugin for WordPress, contained a time-based blind SQL injection vulnerability that, if exploited, could result in sensitive information being exfiltrated from a site’s database.

Webmasters of WordPress sites running the open source plugin, which number more than 600,000, have been urged to update their systems as soon as possible.

The nature of the high severity (CVSS score 7.5) pre-authenticated vulnerability (CVE-2021-24340) means “exfiltrating information would be a relatively slow process, and it would be impractical to use it to extract bulk records”, said Ram Gall, threat analyst and QA engineer at WordPress security platform Wordfence, in a blog post published on Tuesday (May 18).

Catch up on the latest WordPress security news

Nevertheless, “high-value information such as user emails, password hashes, and encryption keys and salts could be extracted in a matter of hours with the help of automated tools such as sqlmap.

In a targeted attack, this vulnerability could be used to extract personally identifiable information from e-commerce sites containing customer information.

“This underscores the importance of having security protections with an endpoint firewall in place wherever sensitive data is stored.”

Constructing the attack

Among other traffic data, WP Statistics provides detailed figures about which pages website users visit.

Accessing a ‘Pages’ menu generates an SQL query that displays these statistics, said Gall.

RECOMMENDED Opera security team discloses multiple flaws in open source web proxy, Privoxy

Although the function is supposed to be restricted to administrators, “it was possible to start loading this page’s constructor by sending a request to wp-admin/admin.php with the page parameter set to ”, continued the threat analyst.

“Since the SQL query ran in the Page constructor,” any visitor could trigger the SQL query without logging in. “A malicious actor could then supply malicious values for the ID or type parameters.”

No esc_ape

As with another time-based blind SQL injection bug Wordfence recently discovered in CleanTalk’s AntiSpam plugin, the use of an function failed to repel the attack for want of a prepared statement, said Gall.

Elaborating on the issue, the threat analyst told The Daily Swig: “We’ve seen multiple instances in the past where escaping input was insufficient and led to a false sense of security, and expect to see more in the future. Escaping input can be sufficient in some cases, but it’s not really a safe assumption anymore.

He added: “Prepared statements have been considered a best practice for a long time now, and while some developers may have avoided them in the past because they can be tricky to implement manually, there’s not really an excuse for not using them in WordPress thanks to the ease of use that allows.”

However, Mostafa Soufi, co-founder of WP Statistics developer VeronaLabs, told The Daily Swig that the flaw was less serious than Wordfence researchers indicated, because “they didn’t provide us an example to [prove] there [was] a security bug on the query,” and “those parameters [were] already sanitized with one by one before the patch”.

The Wordfence threat intelligence team alerted VeronaLabs to the vulnerability on March 13, and a release containing a fix, version 13.0.8, was issued on March 25.

The vulnerability affects all previous versions.

This article was updated on May 25 with additional comments from Mostafa Soufi of VeronaLabs.

YOU MIGHT ALSO LIKE WordPress XXE injection vulnerability could allow attackers to remotely steal host files

Next Post

Barry Diller calls Apple’s App Store fees ‘disgusting’

Tue May 25 , 2021
Media mogul Barry Diller ripped Apple over the fees it charges companies that have apps in iPhone maker’s App Store. “[Our apps are] overcharged in a disgusting manner,” the chairman of IAC and Expedia said in an interview on CNBC’s “Squawk Box on Friday. Diller, whose companies have apps in […]
Barry Diller calls Apple’s App Store fees ‘disgusting’

You May Like

About

muryou-erogazou.net provide by The top global media Technology, Gadget, Website, SEO, Internet Marketing,Digital marketing.