CVE-2018-6024

9.8 CRITICAL

📋 TL;DR

CVE-2018-6024 is a critical SQL injection vulnerability in the Project Log 1.5.3 component for Joomla! that allows attackers to execute arbitrary SQL commands via the search parameter. This affects all Joomla! installations using the vulnerable Project Log component. Attackers can potentially access, modify, or delete database content.

💻 Affected Systems

Products:
  • Joomla! Project Log component
Versions: Project Log 1.5.3 specifically
Operating Systems: All operating systems running Joomla!
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Joomla! installations with Project Log 1.5.3 component installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to remote code execution chaining.

🟠

Likely Case

Unauthorized database access allowing extraction of sensitive information like user credentials, personal data, or administrative access.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permissions restricting damage to non-critical data.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via web requests, making internet-facing Joomla! installations primary targets.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but have reduced attack surface compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts available, requiring minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Project Log 1.5.4 or later

Vendor Advisory: https://www.joomla.org/announcements/release-news/

Restart Required: No

Instructions:

1. Update Project Log component to version 1.5.4 or later via Joomla! Extension Manager. 2. Alternatively, remove the vulnerable component entirely if not needed. 3. Update Joomla! core to latest version for additional security.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize search parameter inputs

Modify component PHP files to add input sanitization: $search = $db->quote($search);

Web Application Firewall Rule

all

Block SQL injection patterns in the search parameter

WAF rule: Block requests containing SQL keywords (UNION, SELECT, INSERT, etc.) in search parameter

🧯 If You Can't Patch

  • Disable or remove the Project Log component entirely from Joomla! installation
  • Implement network segmentation and restrict access to Joomla! administration interface

🔍 How to Verify

Check if Vulnerable:

Check Joomla! Extension Manager for Project Log component version. If version is 1.5.3, system is vulnerable.

Check Version:

Check via Joomla! admin panel: Extensions → Manage → Manage → Search for 'Project Log'

Verify Fix Applied:

Confirm Project Log component version is 1.5.4 or later in Joomla! Extension Manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in Joomla! logs
  • Multiple failed login attempts following SQL injection patterns
  • Unexpected database queries containing UNION, SELECT, or DROP statements

Network Indicators:

  • HTTP requests with SQL injection payloads in search parameter
  • Unusual database connection patterns from web server

SIEM Query:

web.url:*search=* AND (web.url:*UNION* OR web.url:*SELECT* OR web.url:*INSERT* OR web.url:*DROP*)

🔗 References

📤 Share & Export