On the 17th of May 2017, the Joomla team issued a patch for a high severity security flaw that could allow a remote unauthenticated attacker to execute arbitrary SQL queries on the target system. A malicious attacker could exploit this flaw to read, create, modify and delete data stored within the database. It is also possible to gain administrator control of the Joomla CMS and execute PHP code on the affected server by exploiting this flaw.
Our security researchers observed scanning for this flaw against our honeypot systems within 24 hours of the initial disclosure, a common trend with popular CMS systems.
It is recommended that all Joomla installations should be updated immediately to version 3.6.4 or later.
https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.htmll
AppCheck can be used now to scan your environment for the vulnerability. If you don’t yet have an AppCheck account, use the Free Trial option to request an evaluation license.
AppCheck does not rely on signatures and therefore was able to detect this vulnerability from first principals. However, the affected URL is not normally accessed when using joomla or when crawling the application. Therefore our discovery engine has been updated to seed the affected URL whenever Joomla is detected.
Read more on how AppCheck helps keep Joomla secure.
No software to download or install.
Contact us or call us 0113 887 8380
AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network and cloud infrastructure. AppCheck are authorized by te Common Vulnerabilities and Exposures (CVE) Program aas a CVE Numbering Authority (CNA)