<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Liyupi — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/liyupi/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/liyupi/feed.xml" rel="self" type="application/rss+xml"/><item><title>liyupi yu-picture SQL Injection Vulnerability (CVE-2026-7060)</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-yu-picture-sqli/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-yu-picture-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-7060) exists in liyupi yu-picture versions up to a053632c41340152bf75b66b3c543d129123d8ec, allowing a remote attacker to execute arbitrary SQL commands by manipulating the sortField argument in the PageRequest function of PictureServiceImpl.java.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in liyupi yu-picture, a web application, affecting versions up to commit a053632c41340152bf75b66b3c543d129123d8ec. The vulnerability, tracked as CVE-2026-7060, resides in the PageRequest function within the PictureServiceImpl.java file, specifically related to the MyBatis-Plus component. An attacker can exploit this vulnerability remotely by manipulating the <code>sortField</code> argument. Public exploitation details are available, increasing the risk. Given the lack of versioning in the product, determining affected and unaffected releases is challenging, emphasizing the need for immediate patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an endpoint that utilizes the vulnerable <code>PageRequest</code> function in <code>PictureServiceImpl.java</code>.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable endpoint.</li>
<li>The attacker injects a SQL payload into the <code>sortField</code> parameter of the <code>PageRequest</code> function.</li>
<li>The application processes the crafted request, passing the malicious SQL payload to the MyBatis-Plus component.</li>
<li>MyBatis-Plus executes the injected SQL query against the application&rsquo;s database.</li>
<li>The database executes the injected SQL, potentially allowing the attacker to read, modify, or delete data.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials or configuration details.</li>
<li>The attacker uses the compromised data to further compromise the application or gain access to the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7060) can lead to unauthorized data access, modification, or deletion, potentially resulting in complete compromise of the application and its underlying database. The absence of versioning makes identifying vulnerable installations difficult. Given the publicly available exploit, affected organizations are at increased risk of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or update the liyupi yu-picture application to a version containing the fix for CVE-2026-7060 as soon as it becomes available.</li>
<li>Implement input validation and sanitization on the <code>sortField</code> parameter within the <code>PageRequest</code> function to prevent SQL injection.</li>
<li>Deploy the Sigma rule <code>Detect Malicious SortField SQL Injection</code> to identify attempts to exploit this vulnerability in web server logs.</li>
<li>Monitor web server logs for suspicious activity targeting endpoints that use the <code>PageRequest</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7060</category><category>web-application</category></item></channel></rss>