Posts Tagged ‘SQL-injection’


Drupal vulnerabilitiesThe critical vulnerability in Drupal (CVE-2014-3704)

In the release of web content management system Drupal 7.32 fixed a critical vulnerability (CVE-2014-3704), which allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. The vulnerability assigned the highest level of danger (Highly critical), what indicates the possibility of the remote attacks that can lead to gaining access to the system.

The vulnerability is caused by a bug in the implementation of the method “prepared statement” in thedatabase abstraction API and can be exploited by anonymous users. A vulnerability in this API allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. (more…)

SQL-Injection Hackers can use program commands to gain access to databases. This process is known as SQL injection. While information regarding these vulnerabilities is not new, there may be types of SQL injection you are not aware exist. Four SQL injection vulnerabilities you most likely are not aware of include: default database names, .net, Boolean-based injection and dynamic database queries.

Default Database

WordPress helps to make creating blogs and websites easy for those who are not programming experts. However, these sites are not impenetrable to SQL injections or other vulnerabilities. One problem that can leave website owners open to an SQL attack is WordPress’ tendency to create (more…)

Wordpress VulnerabilityWordPress has gotten some negative publicity for being a target for hackers. While no site is totally impenetrable, quite a few computer hackers simply aim at easy targets.

Your WordPress site becomes an easy target when you neglect updates or use site management techniques that make your site inviting. Your home is not impenetrable, but you don’t go out and leave the doors unlocked or leave the windows open. Sure, someone can still break in when it is locked, but thieves are generally in a hurry and want an easy target.

Same with your website, therefore knowing the most common WordPress security mistakes will greatly decrease the odds of your site being hacked. (more…)

Multiple Vulnerabilities in plugins

Multiple Vulnerabilities

Latest vulnerabilities in popular plugins for WordPress: Covert VideoPress, Digg Digg, Video Gallery and Related Posts.

  • Cross-site scripting WordPress Covert VideoPress

Danger level: Low
The presence of fixes: No
The number of vulnerabilities: 1

Vector of operation: Remote
Impact: Cross Site Scripting

Affected products: WordPress Covert VideoPress Theme

Affected versions: WordPress Covert VideoPress (more…)

WordPress PluginsWP-Sentinel – WordPress plugin for protection from dangerous HTTP-requests

Plugin to protect your blog from malicious HTTP-requests, various injections, XSS-attacks, brute force attacks, and flooding. It is to protect WordPress Website from hacking. He checks each HTTP request for a given set of rules to filter malicious requests.

Plugin to protect your blog from malicious HTTP-requests, various injections, XSS-attacks, brute force attacks, and flooding.

WP-Sentinel works as a firewall, analyzing all http-requests coming to the blog, recognizing and blocking dangerous attacks: (more…)

Vulnerability

XSS-attacks

Hosters say about a significant increase in the number of XSS-attacks.

According to statistics from hosting company Firehost, the number of XSS-attacks on websites in the last quarter of 2012 soared by 160% from the same period of 2011. According to the company, out of 64 million detected and blocked attacks, some 2.6 million was attributable to attacks such as cross-site scripting. Quarter before it was discovered just over a million XSS-attacks.

Under these types of attacks Firerost understand three basic types of attack: directory traversal, SQL-injection and cross-site request fake (CSRF). The share of these three main types of attacks have 15.16 percent of the attacks, and 12, respectively.

Firehost notes that XSS-attack – is the base type of attacks used by hackers. It works by placing malicious code on insecure pages, and allows users to manipulate the actions of the attacked site. However, despite its base, this type of attack can have a wide range of applications: from deface the site to a phishing attack. (more…)

Wordpress Vulnerability

SQL-injection in All Video Gallery

Vulnerability: SQL-injection in WordPress All Video Gallery

Danger: High
Patch: Yes

Vector operation: Remote
Impact: Unauthorized change

Affected products: WordPress All Video Gallery Plugin 1.x

Affected versions: WordPress All Video Gallery 1.1 versions prior to 11.02.2012, possibly earlier.

Description:

The vulnerability allows a remote user to execute arbitrary SQL commands in the application database. (more…)

Joomla vulnerability

SQL-injection in Spider Catalog

Vulnerability:SQL-injection in the Joomla! Spider Catalog

Danger: middle
Number of vulnerabilities: 1

Impact: Unauthorized change

Affected products: Spider Catalog 1.x (component for Joomla!)

Affected versions: Joomla! Spider Catalog 1.1, maybe earlier

Description:

The vulnerability allows a remote user to execute arbitrary SQL commands in the application database. (more…)

Vulnerability

SQL-injection in MyBB

Vulnerability: SQL-injection in MyBB Follower User Plugin

Danger: High
Quantity of vulnerabilities: 1
Impact: Unauthorized change

Exploit: PoC code
Affected products: Follower User 1.x (plugin for MyBB)

Affected versions: MyBB Follower User Plugin 1.5, maybe earlier

Description:

The vulnerability allows a remote user to execute arbitrary SQL commands in the application database. (more…)

SQL-injection alertVulnerability: SQL-injection MyBB Profile Albums Plugin

Danger: Middle
If the Patch: None
Number of vulnerabilities: 1

Impact: Unauthorized change
CWE ID: No Information
Be exploited: PoC code
Affected Products: Profile Albums 0.x (plugin for MyBB)

Affected versions: MyBB Profile Albums Plugin 0.9, maybe earlier

Description:

The vulnerability allows a remote user to execute arbitrary SQL commands in the application database. (more…)