WordPress adivaha Travel Plugin SQL Injection Vulnerability (CVE-2023-54359)
The WordPress adivaha Travel Plugin version 2.3 is vulnerable to time-based blind SQL injection via the 'pid' GET parameter, allowing unauthenticated attackers to inject SQL code through the /mobile-app/v3/ endpoint for potential data extraction or denial of service.
The adivaha Travel plugin 2.3 for WordPress is susceptible to a time-based blind SQL injection vulnerability (CVE-2023-54359). This flaw allows unauthenticated attackers to inject malicious SQL code through the ‘pid’ GET parameter in requests to the /mobile-app/v3/ endpoint. By crafting specific ‘pid’ values with XOR-based payloads, attackers can manipulate database queries. This vulnerability can be exploited to extract sensitive database information or to cause a denial-of-service condition on the affected WordPress site. Publicly available exploits exist, increasing the risk of widespread exploitation.
Attack Chain
- An unauthenticated attacker identifies a WordPress site using the vulnerable adivaha Travel Plugin version 2.3.
- The attacker crafts a malicious HTTP GET request targeting the
/mobile-app/v3/endpoint. - The attacker injects SQL code into the
pidGET parameter, utilizing XOR-based payloads to bypass input validation or sanitization. - The server processes the malicious SQL query against the WordPress database.
- Due to the time-based blind SQL injection, the attacker infers information about the database by observing the response time of the server.
- Through repeated requests, the attacker extracts sensitive data from the database, such as user credentials, API keys, or other confidential information.
- Alternatively, the attacker injects SQL code to cause a denial-of-service condition, such as by creating a very long delay.
- The attacker uses the exfiltrated data for malicious purposes or further compromise of the WordPress site.
Impact
Successful exploitation of this SQL injection vulnerability can lead to the extraction of sensitive information from the WordPress database, potentially compromising user accounts, customer data, and other confidential information. Attackers could gain complete control over the affected website, leading to defacement, malware distribution, or further attacks on other systems. A successful denial-of-service attack could also disrupt the availability of the website, impacting business operations and user experience.
Recommendation
- Apply any available patches or updates for the adivaha Travel Plugin to remediate CVE-2023-54359.
- Deploy the Sigma rule
Detect Suspicious adivaha Travel Plugin SQL Injection Attemptto your SIEM to identify potential exploitation attempts targeting the/mobile-app/v3/endpoint. - Inspect web server logs for requests to
/mobile-app/v3/containing suspicious characters or SQL syntax in thepidparameter to identify exploitation attempts (reference: vulnerable endpoint/mobile-app/v3/). - Monitor network traffic for connections to the URLs listed in the IOCs (reference:
https://www.exploit-db.com/exploits/51655andhttps://www.vulncheck.com/advisories/wordpress-adivaha-travel-plugin-sql-injection-via-pid).
Detection coverage 2
Detect Suspicious adivaha Travel Plugin SQL Injection Attempt
highDetects potential SQL injection attempts targeting the adivaha Travel Plugin by monitoring the 'pid' parameter in requests to the /mobile-app/v3/ endpoint.
Detect adivaha Travel Plugin Exploitation via Exploit-DB URL
infoDetects access to the Exploit-DB page referencing the adivaha Travel Plugin SQL injection vulnerability, potentially indicating reconnaissance or active exploitation.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
2
url
| Type | Value |
|---|---|
| url | https://www.exploit-db.com/exploits/51655 |
| url | https://www.vulncheck.com/advisories/wordpress-adivaha-travel-plugin-sql-injection-via-pid |