By sending a specially crafted request, a remote attacker may be able to gain access to the system and possibly run arbitrary SQL queries.

There was also a cross-site request forgery vulnerability in backend/oa/visual/exportExcel.do interface, which can be exploited by sending a request with malicious URL to inject script into the target site.

The latest version of wooCommerce (v6.1) is vulnerable to SQL injection attacks. As a result, attackers may deploy various SQL-injection attacks against the wp-admin/setup-config.php.

In case of a remote SQL-injection attack, an attacker may obtain access to the backend of the website and exploit its vulnerabilities to inject malicious script codes or extract sensitive data.

The latest version of WordPress (4.9.1) is vulnerable to XSS injection attack due to lack of sanitization of user- input in admin/setup-config.php.

In such a scenario, an attacker may leverage injected script codes to perform various actions such as stealing data, performing DDoS attack, etc.

SQL Injection

SQL Injection is one of the easiest vulnerabilities to exploit and can be used as one of the most effective attack vectors. It is a very common vulnerability, even for popular CMS like WordPress, Drupal and Joomla. In case of SQL injection, the attacker injects SQL queries into the system by getting access to the backend or admin panel.
The result of this injection is a privilege escalation from authenticated user to administrator role which allows attackers to perform various malicious actions such as stealing data, performing DDoS attack, etc.

SQL Injection (Technical Overview)

SQL injection is a type of attack that involves inserting SQL code via a web application programming interface (API) parameter or GET/POST request. The goal of such an attack is to manipulate data in the database by exploiting vulnerabilities in SQL-based input validation rules.
SQL injection can occur if there is no filter on user-supplied input, as with most web applications. It can also occur when users enter untrusted input into forms submitted to the database. If a SQL injection vulnerability is exploited, then attackers may be able to view and modify data or even execute arbitrary code on the server.

WordPress

CMS Vulnerabilities
Many WordPress websites are vulnerable to various types of attacks, including SQL injection and XSS injection. The latest version of WordPress (4.9.1) is vulnerable to XSS injection attack due to lack of sanitization of user- input in admin/setup-config.php. In such a scenario, an attacker may leverage injected script codes to perform various actions such as stealing data, performing DDoS attack, etc.

Timeline

Published on: 09/16/2022 14:15:00 UTC
Last modified on: 09/17/2022 02:30:00 UTC

References