CVE-2018-7177
📋 TL;DR
This is a critical SQL injection vulnerability in Saxum Numerology 3.0.4 component for Joomla! that allows attackers to execute arbitrary SQL commands via the publicid parameter. It affects all Joomla! installations using the vulnerable Saxum Numerology component. Attackers can potentially access, modify, or delete database content.
💻 Affected Systems
- Saxum Numerology component for Joomla!
📦 What is this software?
Numerology by Saxum2003
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution through database functions.
Likely Case
Unauthorized database access allowing data extraction, modification of user accounts, and potential privilege escalation.
If Mitigated
Limited impact with proper input validation, parameterized queries, and web application firewall rules blocking SQL injection patterns.
🎯 Exploit Status
Public exploit code is available, making this easily exploitable by attackers with minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to Saxum Numerology component version 3.0.5 or later
Vendor Advisory: https://extensions.joomla.org/extension/saxum-numerology/
Restart Required: No
Instructions:
1. Log into Joomla! admin panel. 2. Navigate to Extensions > Manage > Update. 3. Check for Saxum Numerology component updates. 4. If no update available, manually download and install the latest version from the Joomla! Extensions Directory.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize the publicid parameter before processing
Implement parameterized queries or prepared statements in the component code
Web Application Firewall Rule
allBlock SQL injection patterns targeting the publicid parameter
Add WAF rule: Block requests containing SQL keywords in publicid parameter
🧯 If You Can't Patch
- Disable or uninstall the Saxum Numerology component if not essential
- Implement network segmentation and restrict access to affected systems
🔍 How to Verify
Check if Vulnerable:
Check Joomla! Extensions Manager for installed Saxum Numerology component version. If version is 3.0.4, the system is vulnerable.
Check Version:
Check via Joomla! admin panel: Extensions > Manage > Manage
Verify Fix Applied:
Verify Saxum Numerology component version is 3.0.5 or later in Joomla! Extensions Manager.
📡 Detection & Monitoring
Log Indicators:
- SQL error messages in web server logs
- Unusual database queries from web application
- Multiple failed login attempts following SQL injection patterns
Network Indicators:
- HTTP requests with SQL keywords in publicid parameter
- Abnormal database connection patterns from web server
SIEM Query:
source="web_logs" AND (publicid CONTAINS "UNION" OR publicid CONTAINS "SELECT" OR publicid CONTAINS "INSERT" OR publicid CONTAINS "DELETE")