CVE-2013-7429

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to conduct XML injection attacks via the url parameter in the Googlemaps plugin for Joomla!. Attackers can potentially read arbitrary files, execute code, or perform other malicious actions. Affects Joomla! websites using vulnerable versions of the Googlemaps plugin.

💻 Affected Systems

Products:
  • Googlemaps plugin for Joomla!
Versions: All versions before 3.1
Operating Systems: All operating systems running Joomla!
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Joomla! installations with the Googlemaps plugin installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and website defacement.

🟠

Likely Case

Arbitrary file reading, sensitive information disclosure, and potential privilege escalation.

🟢

If Mitigated

Limited impact if proper input validation and file system permissions are enforced.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is publicly accessible by default.
🏢 Internal Only: LOW - The vulnerability requires external access to the web interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple XML injection via URL parameter with publicly available proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.1 and later

Vendor Advisory: http://www.mapsplugin.com/Google-Maps/Documentation-of-plugin-Googlemap/security-release-3-1-of-plugin-googlemaps.html

Restart Required: No

Instructions:

1. Log into Joomla! admin panel
2. Navigate to Extensions > Manage
3. Update Googlemaps plugin to version 3.1 or later
4. Clear Joomla! cache

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the Googlemaps plugin until patching is possible

Block access to vulnerable file

linux

Use web server configuration to block access to plugin_googlemap2_proxy.php

# Apache: Add to .htaccess
<Files "plugin_googlemap2_proxy.php">
    Order Allow,Deny
    Deny from all
</Files>
# Nginx: Add to server block
location ~* plugin_googlemap2_proxy\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XML injection patterns
  • Restrict file system permissions to limit what the web server can access

🔍 How to Verify

Check if Vulnerable:

Check Joomla! extensions manager for Googlemaps plugin version. If version is below 3.1, the system is vulnerable.

Check Version:

# Check via Joomla! admin panel: Extensions > Manage > Googlemaps plugin details

Verify Fix Applied:

Confirm Googlemaps plugin version is 3.1 or higher in Joomla! extensions manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to plugin_googlemap2_proxy.php with XML payloads in URL parameters
  • File access attempts outside normal plugin directories

Network Indicators:

  • HTTP requests containing XML entities or file paths in URL parameters to the proxy endpoint

SIEM Query:

web.url="*plugin_googlemap2_proxy.php*" AND (web.query="*url=*%3C*%3E*" OR web.query="*url=*file:*" OR web.query="*url=*http:*")

🔗 References

📤 Share & Export