A critical SQL-injection vulnerability
in Joomla most widely used content management system; leaves around 2.8 million websites vulnerable to hackers. The bug allow a hacker to get administrative access of the website. Joomla has fixed the vulnerability earlier this week but it has effected e-commerce and other sensitive industries for over 2 years.
an updated version has been released this week; which has fixed three very critical reported vulnerabilities. The issues fixed in the new update are as under:
- High Priority – Core – SQL Injection (affecting Joomla 3.2 through 3.4.4).
- Medium Priority – Core – ACL Violations (affecting Joomla 3.2 through 3.4.4).
- Medium Priority – Core – ACL Violations (affecting Joomla 3.0 through 3.4.4).
The bug was first reported to Joomla by the Trustwave spiderlab researcher “Asaf Orpani” he discovered the most severe vulnerability of them all; SQL Injection vulnerability (in versions 3.2 and 3.4.4) . The researcher has gained the full admin access of the Joomla powered sites by exploiting vulnerability; while admistrator was logged into the website powered by Joomla.
Since Joomla was a popular used opensource content management system; used all over the world. Joomla immediately releases the version, 3.4.5 which the researcher believe is bug free. So, the administrators who are using Joomla should immediately install the new patch to avoid any attack on their website.
SQL-injection vulnerabilities allow end users to execute powerful commands on a website’s backend database by entering specialized text in search boxes or other input fields found on a webpage. The flaws, which are among the most commonly exploited website vulnerabilities, are the result of an insecure Web application failing to enforce the treatment of incoming data as plaintext rather than executable code. Often, this makes it possible for hackers to download confidential files from the vulnerable server.