CVE-2018-7177

9.8 CRITICAL

📋 TL;DR

This is a critical SQL injection vulnerability in Saxum Numerology 3.0.4 component for Joomla! that allows attackers to execute arbitrary SQL commands via the publicid parameter. It affects all Joomla! installations using the vulnerable Saxum Numerology component. Attackers can potentially access, modify, or delete database content.

💻 Affected Systems

Products:
  • Saxum Numerology component for Joomla!
Versions: 3.0.4
Operating Systems: All platforms running Joomla!
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Joomla! installations with the Saxum Numerology component installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, authentication bypass, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized database access allowing data extraction, modification of user accounts, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and web application firewall rules blocking SQL injection patterns.

🌐 Internet-Facing: HIGH - Web applications are directly accessible from the internet, making exploitation trivial for attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making this easily exploitable by attackers with minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Saxum Numerology component version 3.0.5 or later

Vendor Advisory: https://extensions.joomla.org/extension/saxum-numerology/

Restart Required: No

Instructions:

1. Log into Joomla! admin panel. 2. Navigate to Extensions > Manage > Update. 3. Check for Saxum Numerology component updates. 4. If no update available, manually download and install the latest version from the Joomla! Extensions Directory.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize the publicid parameter before processing

Implement parameterized queries or prepared statements in the component code

Web Application Firewall Rule

all

Block SQL injection patterns targeting the publicid parameter

Add WAF rule: Block requests containing SQL keywords in publicid parameter

🧯 If You Can't Patch

  • Disable or uninstall the Saxum Numerology component if not essential
  • Implement network segmentation and restrict access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check Joomla! Extensions Manager for installed Saxum Numerology component version. If version is 3.0.4, the system is vulnerable.

Check Version:

Check via Joomla! admin panel: Extensions > Manage > Manage

Verify Fix Applied:

Verify Saxum Numerology component version is 3.0.5 or later in Joomla! Extensions Manager.

📡 Detection & Monitoring

Log Indicators:

  • SQL error messages in web server logs
  • Unusual database queries from web application
  • Multiple failed login attempts following SQL injection patterns

Network Indicators:

  • HTTP requests with SQL keywords in publicid parameter
  • Abnormal database connection patterns from web server

SIEM Query:

source="web_logs" AND (publicid CONTAINS "UNION" OR publicid CONTAINS "SELECT" OR publicid CONTAINS "INSERT" OR publicid CONTAINS "DELETE")

🔗 References

📤 Share & Export