X CLOSE

Enter your email below to sign up for latest updates from Appcheck NG.

CLOSE

Simply complete the info below and we'll send you all you need to activate AppCheck NG and undertake your FREE scan.

Please enter individual IP addresses or ranges

Please enter full URLs for your web applications, and both http and https where appropriate

Critical Joomla 3.7 SQL Injection Vulnerability Patched


On the 17th of May 2017, the Joomla team issued a patch for a high severity security flaw that could allow a remote unauthenticated attacker to execute arbitrary SQL queries on the target system. A malicious attacker could exploit this flaw to read, create, modify and delete data stored within the database. It is also possible to gain administrator control of the Joomla CMS and execute PHP code on the affected server by exploiting this flaw.

Our security researchers observed scanning for this flaw against our honeypot systems within 24 hours of the initial disclosure, a common trend with popular CMS systems.

It is recommended that all Joomla installations should be updated immediately to version 3.6.4 or later.

https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.htmll

AppCheck can be used now to scan your environment for the vulnerability. If you don’t yet have an AppCheck account, use the Free Trial option to request an evaluation license.

Proof of Concept

AppCheck does not rely on signatures and therefore was able to detect this vulnerability from first principals. However, the affected URL is not normally accessed when using joomla or when crawling the application. Therefore our discovery engine has been updated to seed the affected URL whenever Joomla is detected.