On the 17th of May 2017, the Joomla team issued a patch for a high severity security flaw that could allow a remote unauthenticated attacker to execute arbitrary SQL queries on the target system. A malicious attacker could exploit this flaw to read, create, modify and delete data stored within the database. It is also possible to gain administrator control of the Joomla CMS and execute PHP code on the affected server by exploiting this flaw.
Our security researchers observed scanning for this flaw against our honeypot systems within 24 hours of the initial disclosure, a common trend with popular CMS systems.
It is recommended that all Joomla installations should be updated immediately to version 3.6.4 or later.
AppCheck can be used now to scan your environment for the vulnerability. If you don’t yet have an AppCheck account, use the Free Trial option to request an evaluation license.
AppCheck does not rely on signatures and therefore was able to detect this vulnerability from first principals. However, the affected URL is not normally accessed when using joomla or when crawling the application. Therefore our discovery engine has been updated to seed the affected URL whenever Joomla is detected.