CVE-2017-17875
📋 TL;DR
This SQL injection vulnerability in JEXTN FAQ Pro extension for Joomla allows attackers to execute arbitrary SQL commands through the id parameter. It affects Joomla websites using JEXTN FAQ Pro extension version 4.0.0. Attackers can potentially access, modify, or delete database content.
💻 Affected Systems
- JEXTN FAQ Pro extension for Joomla
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining
Likely Case
Database information disclosure, including user credentials, sensitive content, and potentially administrative access
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to non-sensitive data
🎯 Exploit Status
Public exploit code available, requires no authentication, simple parameter manipulation
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.0.1 or later
Vendor Advisory: https://www.jextn.com/faq-pro/
Restart Required: No
Instructions:
1. Log into Joomla admin panel
2. Navigate to Extensions > Manage > Update
3. Update JEXTN FAQ Pro to latest version
4. Alternatively, download latest version from vendor site and install via Extensions > Install
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize id parameter before processing
Modify component code to validate id parameter as integer using (int)$id or filter_var($id, FILTER_VALIDATE_INT)
Web Application Firewall Rule
allBlock SQL injection patterns in id parameter
Add WAF rule: Detect and block SQL injection patterns in 'id' parameter of requests to FAQ component
🧯 If You Can't Patch
- Disable or uninstall JEXTN FAQ Pro extension immediately
- Implement strict network segmentation and limit access to affected system
🔍 How to Verify
Check if Vulnerable:
Check Joomla extensions list for JEXTN FAQ Pro version 4.0.0 in admin panel
Check Version:
Check Joomla admin panel: Extensions > Manage > Manage (then find JEXTN FAQ Pro)
Verify Fix Applied:
Verify JEXTN FAQ Pro version is 4.0.1 or higher in extensions manager
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in Joomla logs
- Multiple requests with SQL injection patterns in id parameter
- Unexpected database queries from web server
Network Indicators:
- HTTP requests containing SQL keywords in id parameter
- Requests to view=category with malicious id values
SIEM Query:
web.url:*view=category* AND web.param.id:*SELECT* OR web.param.id:*UNION* OR web.param.id:*OR*1=1*