CVE-2018-6579
📋 TL;DR
This is a critical SQL injection vulnerability in JEXTN Reverse Auction 3.1.0 component for Joomla! that allows attackers to execute arbitrary SQL commands via the 'view=products&uid=' parameter. It affects all Joomla! installations using this vulnerable component version. Attackers can potentially access, modify, or delete database content.
💻 Affected Systems
- JEXTN Reverse Auction component for Joomla!
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution via database functions.
Likely Case
Database information disclosure, data manipulation, and potential privilege escalation within the Joomla! application.
If Mitigated
Limited impact with proper input validation and parameterized queries in place.
🎯 Exploit Status
Public exploit code is available and exploitation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.1 or later
Vendor Advisory: https://www.jextn.com/
Restart Required: No
Instructions:
1. Update JEXTN Reverse Auction component to version 3.1.1 or later. 2. Apply the update through Joomla! extension manager. 3. Clear Joomla! cache after update.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize the 'uid' parameter before processing
Web Application Firewall Rule
allBlock SQL injection patterns in the 'uid' parameter
🧯 If You Can't Patch
- Disable or remove the JEXTN Reverse Auction component entirely
- Implement strict network segmentation and limit access to affected systems
🔍 How to Verify
Check if Vulnerable:
Check Joomla! extension manager for JEXTN Reverse Auction component version 3.1.0
Check Version:
Check Joomla! administrator panel → Extensions → Manage → Manage
Verify Fix Applied:
Confirm component version is 3.1.1 or later in Joomla! extension manager
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in Joomla! logs
- Multiple requests with SQL injection patterns in 'uid' parameter
Network Indicators:
- HTTP requests containing SQL keywords in 'uid' parameter
- Unusual database query patterns from web server
SIEM Query:
web.url:*view=products* AND web.url:*uid=* AND (web.url:*SELECT* OR web.url:*UNION* OR web.url:*OR*1=1*)