CVE-2019-14348

9.8 CRITICAL

📋 TL;DR

This vulnerability allows SQL injection attacks in the BearDev JoomSport plugin for WordPress. Attackers can steal, modify, or delete database information via the 'sid' parameter in playerlist requests. WordPress sites using JoomSport plugin version 3.3 are affected.

💻 Affected Systems

Products:
  • BearDev JoomSport WordPress Plugin
Versions: Version 3.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with JoomSport plugin version 3.3 installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, modification, or deletion; potential for full site takeover via privilege escalation.

🟠

Likely Case

Database information theft including user credentials, sensitive content, and configuration data.

🟢

If Mitigated

Limited impact with proper input validation and database permissions in place.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing and the exploit requires no authentication.
🏢 Internal Only: MEDIUM - Internal WordPress sites could still be targeted by internal threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires no authentication and uses simple SQL injection techniques via URL parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.4 or later

Vendor Advisory: https://wordpress.org/plugins/joomsport/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find JoomSport plugin. 4. Click 'Update Now' if available. 5. If no update available, deactivate and delete plugin, then install latest version from WordPress repository.

🔧 Temporary Workarounds

Input Validation WAF Rule

all

Add web application firewall rule to block SQL injection attempts in sid parameter

ModSecurity rule: SecRule ARGS:sid "@detectSQLi" "id:1001,phase:2,deny,status:403,msg:'SQLi attempt in sid parameter'"

Disable Vulnerable Endpoint

linux

Block access to the vulnerable playerlist endpoint via .htaccess or nginx config

Apache: RewriteRule ^joomsport_season/new-yorkers/\?action=playerlist.*$ - [F,L]
Nginx: location ~* /joomsport_season/new-yorkers/\?action=playerlist { deny all; }

🧯 If You Can't Patch

  • Deactivate JoomSport plugin immediately
  • Implement strict database user permissions and enable query logging

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for JoomSport version 3.3

Check Version:

wp plugin list --name=joomsport --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify JoomSport plugin version is 3.4 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • SQL error messages in web server logs
  • Unusual database queries from web application
  • Multiple requests to /joomsport_season/new-yorkers/?action=playerlist with SQL-like parameters

Network Indicators:

  • HTTP requests containing SQL keywords in sid parameter
  • Unusual traffic patterns to vulnerable endpoint

SIEM Query:

source="web_server.log" AND (uri="/joomsport_season/new-yorkers/" AND query="action=playerlist") AND (sid="*UNION*" OR sid="*SELECT*" OR sid="*INSERT*" OR sid="*DELETE*")

🔗 References

📤 Share & Export