<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Zyx0814 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/zyx0814/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 May 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/zyx0814/feed.xml" rel="self" type="application/rss+xml"/><item><title>zyx0814 FilePress SQL Injection Vulnerability (CVE-2026-8133)</title><link>https://feed.craftedsignal.io/briefs/2024-05-filepress-sqli/</link><pubDate>Wed, 29 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-filepress-sqli/</guid><description>A remote SQL injection vulnerability (CVE-2026-8133) exists in zyx0814 FilePress up to version 2.2.0 via the Shares Filelist API by manipulating the argument order, potentially leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-8133, affects zyx0814 FilePress versions up to 2.2.0. The vulnerability resides within the Shares Filelist API, specifically in the <code>dzz/shares/admin.php</code> file. Attackers can exploit this flaw by manipulating the argument order in requests to this API, leading to the execution of arbitrary SQL queries. Public disclosure of the exploit makes this vulnerability particularly dangerous, as it increases the likelihood of widespread exploitation. A patch, identified as <code>e20ec58414103f781858f2951d178e19b1736664</code>, is available to address this issue. This vulnerability allows remote attackers to potentially read, modify, or delete sensitive data stored in the FilePress database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a FilePress instance running a vulnerable version (&lt;= 2.2.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>dzz/shares/admin.php</code> endpoint.</li>
<li>The request includes specially crafted parameters designed to manipulate the argument order in the SQL query.</li>
<li>The application fails to properly sanitize or validate the input, allowing the malicious SQL code to be injected.</li>
<li>The injected SQL code is executed against the FilePress database.</li>
<li>The attacker extracts sensitive information from the database, such as usernames, passwords, or file metadata.</li>
<li>The attacker may further modify database records to escalate privileges or plant malicious code.</li>
<li>The attacker gains unauthorized access to files or system resources, potentially leading to data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-8133) can have significant consequences. Attackers can gain unauthorized access to sensitive data stored in the FilePress database, potentially leading to data breaches and financial losses. Attackers could modify or delete data, disrupt services, or even gain complete control of the affected FilePress instance. Given the public disclosure of the exploit, organizations using FilePress are at an elevated risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch <code>e20ec58414103f781858f2951d178e19b1736664</code> provided by zyx0814 to remediate CVE-2026-8133.</li>
<li>Deploy the Sigma rule &ldquo;Detect FilePress SQL Injection Attempt via admin.php&rdquo; to your SIEM to identify potential exploitation attempts against the vulnerable <code>dzz/shares/admin.php</code> endpoint.</li>
<li>Review and harden input validation mechanisms in FilePress to prevent future SQL injection vulnerabilities.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>dzz/shares/admin.php</code> endpoint (webserver category).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item></channel></rss>