YOAST_logo_RGB_horizontal
If you’re using WordPress as a blog or as the basis to your website, chances are, you’re using the Yoast WordPress SEO Plugin.  The plugin is used by over 14 million blogs on the web that utilize WordPress, and its been reported that it has been open to an exploit where hackers can do a Blind SQL Injection.

A Blind SQL Injection is a type of SQL Injection that asks the data base a series of true or false questions and determines the answer based on the applications response.  This exploit is used to insert an SQL query into the data base to extract, modify, or delete data.  Most of the time, it’s  used to insert unwanted or unauthorized affiliate, spam links, or malware/adware onto sites.

The attack is usually used when the web application is configured to show generic error message.

In order to fix the issue, make sure you upgrade to the 1.7.4 version of Yoast immediately.  Ryan Dewhurst found out about the exploit and did the security fix after doing a security scan.  The security fix says this:

Security fix: fixed possible CSRF and blind SQL injection vulnerabilities in bulk editor. Added strict sanitation to order_by and order params. Added extra nonce checks on requests sending additional parameters. Minimal capability needed to access the bulk editor is now Editor. Thanks Ryan Dewhurst from WPScan for discovering and responsibly disclosing this issue.”

You can learn more about the vulnerability at TheHackerNews.com.

Original Source by