CVE-2017-1002018

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform blind SQL injection attacks through the event parameter in the Eventr WordPress plugin. Websites running vulnerable versions of the plugin are affected, potentially allowing unauthorized database access.

💻 Affected Systems

Products:
  • Eventr WordPress Plugin
Versions: v1.02.2 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Eventr plugin enabled. The vulnerability exists in edit.php and attendees.php files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including user credentials, sensitive data exfiltration, and potential remote code execution through database functions.

🟠

Likely Case

Data theft including user information, event attendee details, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and database user permissions restricting write operations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection is well-documented and requires authentication to access the vulnerable forms. The blind nature makes exploitation slightly more complex but still straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.02.3 or later

Vendor Advisory: https://wordpress.org/plugins/eventr/

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Eventr plugin
4. Click 'Update Now' if available
5. If no update available, deactivate and delete the plugin
6. Install latest version from WordPress repository

🔧 Temporary Workarounds

Input Sanitization Filter

all

Add input validation to sanitize event parameter before processing

Add sanitization code to edit.php and attendees.php: $event_id = intval($_GET['event']);

🧯 If You Can't Patch

  • Deactivate and remove the Eventr plugin immediately
  • Implement web application firewall rules to block SQL injection patterns targeting the event parameter

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Eventr version. If version is 1.02.2 or earlier, system is vulnerable.

Check Version:

wp plugin get eventr --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify Eventr plugin version is 1.02.3 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by event parameter manipulation
  • Long or malformed event parameter values in web server logs

Network Indicators:

  • HTTP requests with SQL injection patterns in event parameter
  • Unusual database connection patterns from web server

SIEM Query:

source="web_server" AND (event_param CONTAINS "' OR" OR event_param CONTAINS "UNION" OR event_param CONTAINS "SELECT *")

🔗 References

📤 Share & Export