CVE-2016-10114
📋 TL;DR
This is a critical SQL injection vulnerability in the 'aWeb Cart Watching System for Virtuemart' extension for Joomla! that allows remote attackers to execute arbitrary SQL commands. Attackers can exploit this through categorysearch and smartSearch vectors to potentially access, modify, or delete database content. All Joomla! sites using vulnerable versions of this extension are affected.
💻 Affected Systems
- aWeb Cart Watching System for Virtuemart Joomla! extension
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, privilege escalation, and potential remote code execution through database functions.
Likely Case
Unauthorized access to sensitive data including user credentials, payment information, and personal data stored in the database.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.
🎯 Exploit Status
Multiple public exploit scripts available, making this easily exploitable by attackers with minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.6.1
Vendor Advisory: https://vel.joomla.org/resolved/1897-aweb-cart-watching-system-2-6-0
Restart Required: No
Instructions:
1. Log into Joomla! admin panel. 2. Navigate to Extensions > Manage > Update. 3. Update 'aWeb Cart Watching System for Virtuemart' to version 2.6.1 or later. 4. Alternatively, download the latest version from the extension developer and install manually.
🔧 Temporary Workarounds
Disable vulnerable extension
allTemporarily disable the aWeb Cart Watching System extension until patched
Navigate to Extensions > Plugins in Joomla! admin, find 'aWeb Cart Watching System' and disable it
Implement WAF rules
linuxAdd web application firewall rules to block SQL injection attempts targeting categorysearch and smartSearch parameters
Add ModSecurity rules: SecRule ARGS_NAMES "categorysearch|smartSearch" "phase:2,deny,status:403,id:1001"
🧯 If You Can't Patch
- Remove the vulnerable extension completely from the Joomla! installation
- Implement strict input validation and parameterized queries at the application level
🔍 How to Verify
Check if Vulnerable:
Check Joomla! admin panel under Extensions > Manage > Manage for 'aWeb Cart Watching System' version. If version is below 2.6.1, you are vulnerable.
Check Version:
Check Joomla! database: SELECT manifest_cache FROM #__extensions WHERE name LIKE '%aWeb Cart Watching%'
Verify Fix Applied:
Confirm extension version is 2.6.1 or higher in Joomla! admin panel under Extensions > Manage > Manage.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple requests with SQL injection patterns in categorysearch/smartSearch parameters
- Error logs showing SQL syntax errors
Network Indicators:
- HTTP requests containing SQL keywords (UNION, SELECT, INSERT) in categorysearch or smartSearch parameters
- Unusual database connection patterns from web server
SIEM Query:
source="web_logs" AND (categorysearch="*UNION*" OR smartSearch="*SELECT*" OR categorysearch="*INSERT*")
🔗 References
- http://www.securityfocus.com/bid/95293
- https://github.com/qemm/joomlasqli
- https://vel.joomla.org/resolved/1897-aweb-cart-watching-system-2-6-0
- https://www.exploit-db.com/exploits/40973/
- http://www.securityfocus.com/bid/95293
- https://github.com/qemm/joomlasqli
- https://vel.joomla.org/resolved/1897-aweb-cart-watching-system-2-6-0
- https://www.exploit-db.com/exploits/40973/