CVE-2022-0592 Scanner

CVE-2022-0592 Scanner - SQL Injection (SQLi) vulnerability in MapSVG

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

1 minute

Time Interval

24 days 19 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

MapSVG is a WordPress plugin widely used for creating interactive vector maps and custom content on websites. Maps and data visualization features are particularly useful for businesses, developers, and map enthusiasts. Over time, it has gained popularity due to its customizable nature and support for various data formats. The plugin's REST API extends its functionality to allow deeper integration with external applications. Essential for those managing map-based data, it offers comprehensive geographic editing capabilities. With a vibrant user base, its integration with WordPress makes it an effective tool for visually representing complex data.

The vulnerability in MapSVG, before version 6.2.20, is an SQL Injection (SQLi) which does not adequately validate a specific REST API endpoint parameter. This vulnerability allows attackers to execute arbitrary SQL statements on the database, potentially compromising data confidentiality and integrity. Direct SQL operations mean attackers can manipulate or access information, making it particularly severe. Attackers without authentication can exploit this, significantly broadening the vulnerability's potential impact. As it's via a RESTful endpoint, this breach can be triggered through standard HTTP requests. Thus, the vulnerability risks data integrity and exposes sensitive site information.

The SQL Injection vulnerability is accessible via a REST endpoint lacking necessary validations and escaping mechanisms. The parameter in question doesn't sanitize input properly, allowing SQL queries to be constructed maliciously. The template sends specially crafted HTTP requests to determine the vulnerability's presence. By observing server response times, it confirms the injection through time-based queries, illustrating exploitation feasibility. The specific crafted query in the request includes logic that triggers the vulnerability, like prolonged response times indicative of injection success. The lack of user authentication for exploitation exacerbates the security concerns.

The exploitation of this vulnerability can lead to unauthorized data access and modification, posing critical security threats. Attackers might extract sensitive information such as user credentials, leading to unauthorized access. The integrity of the stored data is at risk, as attackers can manipulate database records. Moreover, exploitation may affect website uptime and availability if attackers execute heavier or malicious database operations. Unauthorized access may extend to other databases connected through the same credentials, posing a broader data breach risk. Besides data integrity and confidentiality, the website's credibility may suffer, with potential impacts on user trust and regulatory compliance.

REFERENCES

Get started to protecting your digital assets