CVE-2018-6396

9.8 CRITICAL

📋 TL;DR

This vulnerability allows SQL injection attacks in the Google Map Landkarten component for Joomla! through parameters like cid, id, or map. Attackers can execute arbitrary SQL commands, potentially compromising the database. All Joomla! sites using the vulnerable component are affected.

💻 Affected Systems

Products:
  • Google Map Landkarten component for Joomla!
Versions: Through 4.2.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Joomla! installations with the Google Map Landkarten component installed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, or deletion; potential remote code execution via database functions; full system takeover.

🟠

Likely Case

Database information disclosure, authentication bypass, or data manipulation leading to site defacement or user data exposure.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only read access to non-sensitive data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires no authentication. Simple parameter manipulation can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.4 or later

Vendor Advisory: https://extensions.joomla.org/extension/google-map-landkarten/

Restart Required: No

Instructions:

1. Log into Joomla! admin panel. 2. Navigate to Extensions > Manage > Update. 3. Update Google Map Landkarten component to version 4.2.4 or later. 4. Alternatively, download latest version from Joomla! extensions directory and install manually.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement parameter validation to sanitize cid, id, and map parameters before processing.

Implement PHP input filtering using prepared statements or parameterized queries

Component Disable

all

Temporarily disable the Google Map Landkarten component if not essential.

Navigate to Extensions > Manage > Manage, find Google Map Landkarten, and disable

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SQL injection patterns in the vulnerable parameters.
  • Restrict database user permissions to minimize potential damage from successful exploitation.

🔍 How to Verify

Check if Vulnerable:

Check component version in Joomla! admin panel under Extensions > Manage > Manage, look for Google Map Landkarten version.

Check Version:

Check Joomla! admin panel or database #__extensions table for component version.

Verify Fix Applied:

Confirm component version is 4.2.4 or later in the Joomla! extensions manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests with SQL-like patterns in cid, id, or map parameters

Network Indicators:

  • HTTP requests containing SQL injection payloads in vulnerable parameters

SIEM Query:

web.url:*layout=form_markers* AND (web.param:*cid=* OR web.param:*id=*) AND web.param:*sql*

🔗 References

📤 Share & Export