this post was submitted on 04 Apr 2024
74 points (100.0% liked)

Cybersecurity

5379 readers
168 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
top 9 comments
sorted by: hot top controversial new old
[–] [email protected] 31 points 5 months ago (1 children)

Trivial bugs like this remind me of this:

[–] [email protected] 4 points 5 months ago

Can I just believe in my mediocrity instead

[–] [email protected] 22 points 5 months ago (1 children)

The vulnerability is due to "insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query," according to Wordfence.

"This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database," the company said.

Ohh yes, little Bobby Tables.

[–] [email protected] 13 points 5 months ago (1 children)

What a convoluted way they chose to say “we didn’t use a prepared statement” lol

[–] [email protected] 5 points 5 months ago* (last edited 5 months ago)

Wordfence is a security and vulnerability monitor for Wordpress. The flaw is in the plugin “layerslider”

[–] [email protected] 10 points 5 months ago

The plugin is LayerSlider for anyone who is concerned.

[–] [email protected] 8 points 5 months ago

However, to exploit the flaw requires a "a time-based blind approach" on the part of attackers to extract database information, which is "an intricate, yet frequently successful method to obtain information from a database when exploiting SQL Injection vulnerabilities," according to Wordfence.

I wouldn't call that intricate. It's pretty standard to try it since you get immidiate feedback that you can inject sql statements.

[–] [email protected] 3 points 5 months ago

Again! This kind of thing is why I quit using Wordpress over a decade ago. Static sites don't have this problem and serve a lot of people's needs better than a dynamic site.

[–] [email protected] 3 points 5 months ago

o the worlds most website builder