Plataforma
wordpress
Componente
lifterlms
Corrigido em
7.6.3
CVE-2024-4743 represents a critical SQL Injection vulnerability affecting the LifterLMS WordPress LMS plugin. This flaw allows authenticated attackers, possessing Contributor-level access or higher, to inject malicious SQL queries into existing database queries. Versions of LifterLMS up to and including 7.6.2 are vulnerable. A patch is available from the vendor.
The impact of this SQL Injection vulnerability is severe. An attacker can leverage it to extract sensitive data stored within the LifterLMS database, including user credentials, course details, and payment information. Successful exploitation could lead to unauthorized access to student data, disruption of learning activities, and potential financial losses. The ability to append SQL queries allows for complex data extraction and manipulation, potentially compromising the entire WordPress site if the database contains sensitive application configuration data. This vulnerability shares similarities with other SQL Injection attacks where attackers gain unauthorized access to data by manipulating database queries.
CVE-2024-4743 was publicly disclosed on June 5, 2024. The vulnerability is considered high probability due to the ease of exploitation and the potential impact. No public proof-of-concept (POC) code has been publicly released as of this writing, but the vulnerability's nature suggests that it is likely to be exploited in the near future. Monitor security advisories and threat intelligence feeds for any indications of active exploitation.
WordPress websites utilizing the LifterLMS plugin, particularly those with a large number of users and sensitive data, are at significant risk. Shared hosting environments where multiple WordPress sites share the same database are also at increased risk, as a compromise of one site could potentially lead to the compromise of others. Sites with legacy configurations or those that haven't regularly updated their plugins are especially vulnerable.
• wordpress / composer / npm:
grep -r "lifterlms_favorites shortcode orderBy attribute" /var/www/html/wp-content/plugins/lifterlms/• generic web:
curl -I 'https://your-wordpress-site.com/?lifterlms_favorites&orderBy='; # Check for unusual SQL syntax in the responsedisclosure
Status do Exploit
EPSS
0.37% (percentil 59%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2024-4743 is to immediately upgrade to the latest version of the LifterLMS plugin, which contains the necessary fix. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to filter out malicious SQL injection attempts targeting the lifterlms_favorites shortcode's orderBy parameter. Specifically, look for unusual characters or SQL keywords within the parameter value. Additionally, review user roles and permissions to ensure that only authorized users have access to sensitive data. After upgrade, confirm the vulnerability is resolved by attempting a SQL injection payload via the orderBy parameter and verifying that it is properly sanitized.
Actualice el plugin LifterLMS a una versión posterior a la 7.6.2. Esto solucionará la vulnerabilidad de inyección SQL. La actualización se puede realizar desde el panel de administración de WordPress.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2024-4743 is a critical SQL Injection vulnerability in the LifterLMS WordPress plugin, allowing attackers to potentially extract sensitive data from the database.
You are affected if you are using LifterLMS version 7.6.2 or earlier. Check your plugin version and upgrade immediately.
Upgrade to the latest version of the LifterLMS plugin. As a temporary workaround, implement a WAF rule to filter malicious SQL injection attempts.
While no public exploits are currently known, the vulnerability's ease of exploitation suggests it is likely to be targeted soon. Monitor security advisories.
Refer to the official LifterLMS website and WordPress plugin repository for the latest security advisory and update information.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.