CVE-2018-6372
📋 TL;DR
This vulnerability allows SQL injection attacks through the order_number parameter in JB Bus 2.3 component for Joomla!. Attackers can execute arbitrary SQL commands to steal, modify, or delete database content. All Joomla! installations using JB Bus 2.3 component are affected.
💻 Affected Systems
- Joomla! JB Bus component
📦 What is this software?
Jb Bus by Joombooking
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, modification, deletion, and potential remote code execution via database functions.
Likely Case
Data exfiltration of sensitive information, privilege escalation, and database manipulation.
If Mitigated
Limited impact with proper input validation and parameterized queries preventing SQL injection.
🎯 Exploit Status
Exploit code is publicly available and requires minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to JB Bus component version 2.4 or later
Vendor Advisory: https://extensions.joomla.org/extension/jb-bus/
Restart Required: No
Instructions:
1. Log into Joomla! admin panel. 2. Navigate to Extensions > Manage > Update. 3. Update JB Bus component to latest version. 4. Alternatively, download latest version from Joomla! extensions directory and install manually.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize order_number parameter before processing
Implement parameterized queries or prepared statements in PHP code
Web Application Firewall Rule
allBlock SQL injection patterns in order_number parameter
Add WAF rule: Detect and block SQL keywords in order_number parameter
🧯 If You Can't Patch
- Disable JB Bus component entirely if not required
- Implement network segmentation to restrict access to vulnerable application
🔍 How to Verify
Check if Vulnerable:
Check Joomla! extensions manager for JB Bus component version 2.3
Check Version:
Check Joomla! admin panel: Extensions > Manage > Manage
Verify Fix Applied:
Confirm JB Bus component version is 2.4 or higher in extensions manager
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts after SQL injection
- Unexpected database schema changes
Network Indicators:
- HTTP requests with SQL keywords in order_number parameter
- Abnormal database connection patterns from web server
SIEM Query:
source="web_logs" AND (order_number CONTAINS "UNION" OR order_number CONTAINS "SELECT" OR order_number CONTAINS "INSERT")