• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
wp statistics bug allows attackers to lift data from wordpress

WP Statistics Bug Allows Attackers to Lift Data from WordPress Sites

You are here: Home / Latest Cyber Security Vulnerabilities / WP Statistics Bug Allows Attackers to Lift Data from WordPress Sites
May 21, 2021

The plugin, installed on hundreds of countless numbers of sites, allows everyone to filch database info without having to be logged in.

WP Figures, a plugin set up on far more than 600,000 WordPress websites, has an SQL-injection security vulnerability that could let web page visitors make off with all types of sensitive facts from web databases, which includes emails, credit score-card data, passwords and extra.

WP Data, as its name implies, is a plugin that delivers analytics for website proprietors, which include how quite a few men and women visit the website, the place they are coming from, what browsers and research engines they use, and which pages, groups and tags have the most visits. It also provides anonymized information all around IP addresses, referring sites, and region- and metropolis-stage aspects for readers, all introduced in the type of charts and graphs.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Wordfence researchers found the higher-severity bug (tracked as CVE-2021-24340, ranking 7.5 out of 10 on the CVSS scale) in the “Pages” operate, which lets directors see which pages have acquired the most traffic. It returns this facts employing SQL queries to a back-stop database – but it turns out that unauthenticated attackers can hijack the function to conduct their own queries, in get to purloin sensitive facts.

“While the ‘Pages’ page was meant for administrators only and would not display screen facts to non-admin consumers, it was attainable to start out loading this page’s constructor by sending a request to wp-admin/admin.php with the web page parameter established to wps_web pages_website page,” reported Wordfence scientists in a publishing this 7 days. “Since the SQL query ran in the constructor for the ‘Pages’ web page, this intended that any web page visitor, even those people without having a login, could bring about this SQL query to run. A destructive actor could then offer destructive values for the ID or variety parameters.”

The unique vulnerability is a time-primarily based blind SQL injection, according to researchers at Wordfence. This procedure includes sending requests to the database that “guess” at the information of a database table and instruct the database to delay the response or “sleep” if that guess is proper.

For instance, an attacker could check with the databases if the very first letter of the admin user’s email handle starts with the letter “A,” and instruct it to delay the reaction by five seconds if this is true.

“Exfiltrating info would be a comparatively gradual procedure, and it would be impractical to use it to extract bulk documents, but superior-value info this sort of as consumer e-mail, password hashes, and encryption keys and salts could be extracted in a make any difference of hours with the help of automated applications this sort of as sqlmap,” in accordance to Wordfence. “In a specific attack, this vulnerability could be utilized to extract personally identifiable information from commerce websites containing client data. This underscores the value of possessing security protections with an endpoint firewall in put anywhere delicate details is saved.”

The only reliable system of blocking SQL injection is to get ready all SQL statements in advance of executing them, researchers added. Prepared statements isolate every question parameter so that an adversary would not be in a position to see the full scope of the details that is returned.

“Unfortunately, whilst this SQL query utilised esc_sql to endeavor to escape the ID and kind input parameters, it did not use a ready assertion,” spelled out the researchers. “Since the ID input parameter was not quoted, it was trivial to bypass the esc_sql perform and produce queries which could be utilised to extract sensitive details from the web page.”

VeronaLabs, the plugin’s developer, has introduced a patch with model 13..8, so web page administrators ought to update as swiftly as possible.

A comparable bug was uncovered previously in May possibly, which impacted the “Spam protection, AntiSpam, FireWall by CleanTalk” plugin, which is put in on additional than 100,000 web pages. It way too allowed adversaries to use the time-based mostly bling SQL tactic, also without having getting to be logged on to mount an attack.

Down load our special Cost-free Threatpost Insider E book, “2021: The Evolution of Ransomware,” to support hone your cyber-defense strategies towards this expanding scourge. We go outside of the position quo to uncover what’s future for ransomware and the associated emerging challenges. Get the full tale and Down load the Ebook now – on us!


Some areas of this write-up are sourced from:
threatpost.com

Previous Post: «servicenow, microsoft expand partnership, enable ‘virtual war room’ during cyber ServiceNow, Microsoft expand partnership, enable ‘virtual war room’ during cyber incidents
Next Post: Ransomware Gang Gifts Decryption Tool to HSE Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.