CVE-2020-35613

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Joomla's backend user list allows authenticated attackers to execute arbitrary SQL commands. It affects Joomla installations from version 3.0.0 through 3.9.22. Attackers with backend access can potentially extract, modify, or delete database content.

💻 Affected Systems

Products:
  • Joomla
Versions: 3.0.0 through 3.9.22
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires backend access to exploit. All Joomla installations in affected version range are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, or complete system takeover via subsequent attacks.

🟠

Likely Case

Unauthorized data access, user credential theft, and potential privilege escalation within the Joomla application.

🟢

If Mitigated

Limited impact with proper access controls, though SQL injection remains a serious vulnerability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated backend access. SQL injection techniques are well-documented and weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.9.23

Vendor Advisory: https://developer.joomla.org/security-centre/831-20201104-core-sql-injection-in-com-users-list-view.html

Restart Required: No

Instructions:

1. Backup your Joomla installation and database. 2. Update Joomla to version 3.9.23 or later via the Joomla Update component. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Backend Access

all

Limit backend access to trusted IP addresses only

# Configure web server (Apache example) to restrict /administrator access
<Location /administrator>
    Order deny,allow
    Deny from all
    Allow from 192.168.1.0/24
</Location>

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all user inputs
  • Apply web application firewall rules to block SQL injection patterns

🔍 How to Verify

Check if Vulnerable:

Check Joomla version in System Information or via version.php file. If version is between 3.0.0 and 3.9.22, system is vulnerable.

Check Version:

grep -i 'RELEASE' /path/to/joomla/administrator/manifests/files/joomla.xml | head -1

Verify Fix Applied:

Verify Joomla version is 3.9.23 or later. Check that the patch has been applied by reviewing the changelog.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by backend access
  • Suspicious user agent strings in access logs

Network Indicators:

  • SQL injection patterns in HTTP requests to /administrator
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/administrator/*" AND (query="*SELECT*" OR query="*UNION*" OR query="*INSERT*" OR query="*UPDATE*")

🔗 References

📤 Share & Export