SQL Injection Vulnerability in NextGEN Gallery for WordPress

De pe https://blog.sucuri.net/2017/02/sql-injection-vulnerability-nextgen-gallery-wordpress.html:

As part of a vulnerability research project for our Sucuri Firewall (WAF), we have been auditing multiple open source projects looking for security issues. While working on the WordPress plugin NextGEN Gallery, we discovered a severe SQL Injection vulnerability. This vulnerability allows an unauthenticated user to grab data from the victim’s website database, including sensitive user information.
Are You at Risk?

This vulnerability can be exploited by attackers in at least two different scenarios:

  • If you use a NextGEN Basic TagCloud Gallery on your site, or
  • If you allow your users to submit posts to be reviewed (contributors).

If you fit into any of these two cases, you’re definitely at risk.

This issue existed because NextGEN Gallery allowed improperly sanitized user input in a WordPress prepared SQL query; which is basically the same as adding user input inside a raw SQL query. Using this attack vector, an attacker could leak hashed passwords and WordPress secret keys in certain configurations.

3 Likes