Joomla users: Update immediately to kill severe SQLi vulnerability
Written by net-security.org   

Version 3.7 of Joomla, pushed out less than a month ago, opens websites to SQL injection attacks, Sucury Security researchers have found.

joomla SQLi vulnerability

As explained by researcher Marc-Alexandre Montpas: “The vulnerability is caused by a new component, com_fields, which was introduced in version 3.7. This vulnerable component is publicly accessible, which means this issue can be exploited by any malicious individual visiting your site.”

Sucuri has published technical details[1] about the vulnerability on Wednesday, in the wake of the release of Joomla 3.7.1[2], which fixes this severe issue and several other bugs.

The SQLi vulnerability (CVE-2017-8917) is easy to exploit, and can be exploited remotely.

“Given the nature of SQL Injection attacks, there are many ways an attacker could cause harm – examples include leaking password hashes and hijacking a logged-in user’s session (the latter results in a full site compromise if an administrator session is stolen),” Montpas noted.

Joomla is the second-most widely used[3] open source content management system in the world. While the number of sites powered by it is dwarfed by that of sites running on WordPress, it is still considerable.

This popularity is a boon to attackers, who are quick to exploit public vulnerability information and the fact that many administrators are slow to upgrade, as evidenced many[4] times[5] before.

“This is a serious vulnerability that can be misused in different ways to compromise a vulnerable site. Update now,” Montpas advised.

References

  1. ^ technical details (blog.sucuri.net)
  2. ^ Joomla 3.7.1 (downloads.joomla.org)
  3. ^ second-most widely used (w3techs.com)
  4. ^ many (www.helpnetsecurity.com)
  5. ^ times (www.helpnetsecurity.com)


Posted originally: 2017-05-18 12:11:13

@Read More
Comments (0)
Comment:
Security
Please input the anti-spam code that you can read in the image.