CVE-2018-17381

9.8 CRITICAL

📋 TL;DR

This CVE describes a SQL injection vulnerability in the Dutch Auction Factory 2.0.2 component for Joomla! CMS. Attackers can exploit the filter_order_Dir or filter_order parameters to execute arbitrary SQL commands, potentially compromising the database. All Joomla! installations using this vulnerable component are affected.

💻 Affected Systems

Products:
  • Dutch Auction Factory component for Joomla!
Versions: 2.0.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Joomla! installations with the Dutch Auction Factory component installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, authentication bypass, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information like user credentials, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.3 or later

Vendor Advisory: https://extensions.joomla.org/extension/dutch-auction-factory/

Restart Required: No

Instructions:

1. Update Dutch Auction Factory component to version 2.0.3 or later. 2. Update through Joomla! Extension Manager or manually install updated component. 3. Verify update completion in component manager.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation to sanitize filter_order_Dir and filter_order parameters

Modify component code to validate/sanitize input parameters before SQL query execution

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns in HTTP requests

Configure WAF to detect and block SQL injection attempts on vulnerable parameters

🧯 If You Can't Patch

  • Disable or remove the Dutch Auction Factory component entirely
  • Implement network segmentation to restrict access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check Joomla! Extension Manager for Dutch Auction Factory component version 2.0.2

Check Version:

Check Joomla! admin panel → Extensions → Manage → Dutch Auction Factory version

Verify Fix Applied:

Verify component version is 2.0.3 or later in Joomla! Extension Manager

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in Joomla! logs
  • Multiple failed login attempts following SQL errors
  • Unexpected database queries containing filter_order parameters

Network Indicators:

  • HTTP requests with SQL injection payloads in filter_order_Dir or filter_order parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="joomla_logs" AND ("filter_order" OR "filter_order_Dir") AND ("UNION" OR "SELECT" OR "INSERT" OR "DELETE" OR "UPDATE")

🔗 References

📤 Share & Export