CVE-2018-17399
📋 TL;DR
This vulnerability allows SQL injection attacks through the 'id' parameter in the Jimtawl 2.2.7 component for Joomla!. Attackers can execute arbitrary SQL commands, potentially compromising the database. All Joomla! installations using the vulnerable Jimtawl component are affected.
💻 Affected Systems
- Joomla! with Jimtawl component
📦 What is this software?
Jimtawl by Jimtawl Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution via database functions.
Likely Case
Database information disclosure, authentication bypass, or data manipulation leading to site defacement or user data exposure.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection.
🎯 Exploit Status
Exploit code is publicly available and requires minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Jimtawl version after 2.2.7
Vendor Advisory: https://www.exploit-db.com/exploits/45524
Restart Required: No
Instructions:
1. Update Jimtawl component to latest version. 2. If update unavailable, remove or disable the component. 3. Apply Joomla! security patches if available.
🔧 Temporary Workarounds
Input Validation Filter
allImplement input validation to sanitize the 'id' parameter before processing.
Modify component code to validate 'id' parameter as integer using PHP filter_var($id, FILTER_VALIDATE_INT)
Web Application Firewall
allDeploy WAF with SQL injection protection rules.
Configure WAF to block SQL injection patterns in URL parameters
🧯 If You Can't Patch
- Disable or remove the Jimtawl component entirely
- Implement network segmentation to restrict access to vulnerable systems
🔍 How to Verify
Check if Vulnerable:
Check Joomla! extensions manager for Jimtawl component version 2.2.7.
Check Version:
Check Joomla! administrator panel → Extensions → Manage → Components → Jimtawl
Verify Fix Applied:
Verify Jimtawl component version is updated beyond 2.2.7 and test 'id' parameter with SQL injection payloads.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in logs
- Multiple requests with SQL-like patterns in 'id' parameter
- Failed login attempts from unexpected sources
Network Indicators:
- HTTP requests containing SQL keywords (SELECT, UNION, etc.) in URL parameters
- Unusual database connection patterns
SIEM Query:
source="web_logs" AND (url="*id=*SELECT*" OR url="*id=*UNION*" OR url="*id=*OR*" OR url="*id=*AND*")