Supsystic Ultimate Maps SQL Injection Vulnerability (CVE-2020-37242)
Supsystic Ultimate Maps 1.1.12 is vulnerable to SQL injection via the 'sidx' GET parameter, allowing unauthenticated attackers to execute arbitrary SQL queries and extract sensitive database information.
Supsystic Ultimate Maps is a WordPress plugin that allows users to create custom maps. Version 1.1.12 of this plugin contains a critical SQL injection vulnerability (CVE-2020-37242). Unauthenticated attackers can exploit this vulnerability by injecting malicious SQL code into the ‘sidx’ GET parameter when calling the ‘getListForTbl’ action. Successful exploitation allows attackers to execute arbitrary SQL queries, potentially leading to the extraction of sensitive database information. This vulnerability poses a significant risk to websites using the affected plugin, as it could result in data breaches and compromise of user information.
Attack Chain
- An unauthenticated attacker identifies a WordPress website running Supsystic Ultimate Maps version 1.1.12.
- The attacker crafts a malicious HTTP GET request targeting the
getListForTblaction with a SQL injection payload in thesidxparameter. - The malicious GET request is sent to the WordPress website.
- The WordPress plugin processes the request without proper sanitization of the
sidxparameter. - The injected SQL code is executed against the website’s database.
- The attacker uses boolean-based or time-based blind SQL injection techniques to extract data.
- Sensitive information, such as usernames, passwords, or other database records, is retrieved.
- The attacker exfiltrates the stolen data for malicious purposes.
Impact
Successful exploitation of CVE-2020-37242 can lead to the complete compromise of the vulnerable website’s database. Attackers can gain access to sensitive information, including user credentials, personal data, and other confidential data stored in the database. This can result in data breaches, identity theft, financial loss, and reputational damage for the website owner and its users. The CVSS v3.1 base score for this vulnerability is 8.2, indicating a high level of severity.
Recommendation
- Upgrade Supsystic Ultimate Maps to a patched version that addresses CVE-2020-37242 to remediate the SQL injection vulnerability.
- Deploy the Sigma rule
Detect CVE-2020-37242 Exploitation — SQL Injection in Supsystic Ultimate Mapsto your SIEM to detect exploitation attempts. - Monitor web server logs for suspicious GET requests to the
getListForTblaction containing SQL injection payloads in thesidxparameter as covered by the detection rule.
Detection coverage 1
Detect CVE-2020-37242 Exploitation — SQL Injection in Supsystic Ultimate Maps
highDetects CVE-2020-37242 exploitation — SQL injection attempts in Supsystic Ultimate Maps via the sidx parameter in getListForTbl action
Detection queries are available on the platform. Get full rules →