CVE-2018-6368

9.8 CRITICAL

📋 TL;DR

This CVE describes a SQL injection vulnerability in the JomEstate PRO component for Joomla! CMS. Attackers can exploit the 'id' parameter in 'task=detailed' actions to execute arbitrary SQL commands, potentially compromising the database. All Joomla! sites using vulnerable versions of JomEstate PRO are affected.

💻 Affected Systems

Products:
  • JomEstate PRO for Joomla!
Versions: Through 3.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Joomla! CMS with JomEstate PRO component installed and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion; potential privilege escalation to full system access; possible remote code execution through database functions.

🟠

Likely Case

Database information disclosure (user credentials, sensitive data), data manipulation, and potential site defacement.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database user privilege restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.7

Vendor Advisory: https://extensions.joomla.org/extension/jomestate-pro/

Restart Required: No

Instructions:

1. Log into Joomla! admin panel
2. Navigate to Extensions > Manage > Update
3. Update JomEstate PRO to latest version
4. Alternatively, download latest version from vendor and install via Extensions > Install

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize the 'id' parameter before processing

Modify component PHP files to add: $id = (int)$_GET['id']; or use Joomla! JInput filtering

WAF Rule

all

Implement web application firewall rules to block SQL injection patterns

Add WAF rule: Detect and block SQL keywords in 'id' parameter for JomEstate URLs

🧯 If You Can't Patch

  • Disable or remove JomEstate PRO component entirely
  • Restrict access to vulnerable endpoints using .htaccess or web server configuration

🔍 How to Verify

Check if Vulnerable:

Check Joomla! admin panel > Extensions > Manage > Manage for JomEstate PRO version. If version is 3.7 or earlier, system is vulnerable.

Check Version:

Check Joomla! admin panel or examine /administrator/components/com_jomestate/jomestate.xml file version tag

Verify Fix Applied:

After update, verify JomEstate PRO version is above 3.7. Test vulnerable endpoint with SQL injection payloads to confirm they're blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in Joomla! logs
  • Multiple requests with SQL keywords in 'id' parameter
  • Requests to index.php?option=com_jomestate&task=detailed&id= with suspicious payloads

Network Indicators:

  • HTTP requests containing SQL injection patterns in query strings
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="*com_jomestate*" AND (query="*task=detailed*" AND (query="*id=*SELECT*" OR query="*id=*UNION*" OR query="*id=*OR*"))

🔗 References

📤 Share & Export