Company
Date Published
Author
Karim El Ouerghemmi
Word count
685
Language
English
Hacker News points
None

Summary

Joomla!, a widely used content management system, has been found to be vulnerable to a second-order SQL injection (CVE-2018-6376) that can be exploited by attackers to gain full admin permissions, allowing them to execute arbitrary PHP code and potentially take over the installation. The vulnerability affects Joomla! versions prior to 3.8.4, with affected installations requiring lower permissions than the Administrator or Super Users user groups. An attacker needs to be authenticated as a Manager account to exploit the vulnerability, which can read arbitrary data from the database, leading to further escalation of privileges. A static code analyzer, RIPS, was used to identify the vulnerability, and the Joomla! security team has released a fixed version, 3.8.4, to address the issue. Users are advised to update to the latest version to prevent exploitation.