<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2021-47954 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2021-47954/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:20:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2021-47954/feed.xml" rel="self" type="application/rss+xml"/><item><title>LayerBB 1.1.4 SQL Injection Vulnerability (CVE-2021-47954)</title><link>https://feed.craftedsignal.io/briefs/2026-05-layerbb-sql-injection/</link><pubDate>Sat, 16 May 2026 16:20:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-layerbb-sql-injection/</guid><description>LayerBB version 1.1.4 is vulnerable to SQL injection via the search_query parameter, allowing unauthenticated attackers to inject SQL code and extract sensitive database information.</description><content:encoded><![CDATA[<p>LayerBB version 1.1.4 is susceptible to an SQL injection vulnerability (CVE-2021-47954) that allows unauthenticated attackers to manipulate database queries. This vulnerability arises from the insufficient sanitization of the <code>search_query</code> parameter, enabling attackers to inject arbitrary SQL code through crafted POST requests to <code>/search.php</code>. Successful exploitation could lead to the extraction of sensitive database information, potentially compromising the entire LayerBB installation. This poses a significant risk to organizations using this version of LayerBB, as attackers could gain unauthorized access to confidential data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable LayerBB 1.1.4 instance.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/search.php</code> endpoint.</li>
<li>The POST request includes a <code>search_query</code> parameter containing SQL injection payloads, such as <code>CASE WHEN</code> statements.</li>
<li>The vulnerable application fails to properly sanitize the <code>search_query</code> parameter.</li>
<li>The injected SQL code is executed within the context of the database query.</li>
<li>The attacker extracts sensitive database information, such as user credentials or application data.</li>
<li>The extracted information is sent back to the attacker.</li>
<li>The attacker leverages the compromised data to gain further access or control over the LayerBB installation or related systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2021-47954) can lead to the complete compromise of the LayerBB 1.1.4 installation. Attackers can extract sensitive information, including user credentials, personal data, and potentially other confidential application data. This can result in data breaches, identity theft, and reputational damage for the affected organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for LayerBB to address CVE-2021-47954.</li>
<li>Deploy the Sigma rule <code>Detect LayerBB SQL Injection Attempt via Search Query</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement input validation and sanitization measures on the <code>search_query</code> parameter to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/search.php</code> containing SQL injection payloads.</li>
<li>Review and harden database security configurations to limit the impact of potential SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2021-47954</category><category>web-application</category></item></channel></rss>