December 16, 2015 By Larry Loeb 2 min read

On Dec. 12, security company Sucuri noted that it had seen zero-day attacks in the wild on Joomla, a popular open-source content management system (CMS). These attacks affected versions 1.5.0 through 3.4.5. The CMS presents a tempting target for cybercriminals since it has such a wide installed base. Attackers can try to insert their own backdoors into a system, for example, using the CMS as an infection vector.

Why Joomla?

“The attackers are doing an object injection via the HTTP user agent that leads to a full remote command execution,” explained Daniel Cid, founder and CTO of Sucuri, on the company’s blog.

The user agent string includes the browser type and version and the computer’s operating system and version. The flaw was caused by a lack of proper filtering when saving browser session values into the database.

In response to the discovery, Joomla issued a patch, V3.4.6, on Dec. 14 that corrected the problem for supported versions of the software. There was also a hotfix issued for the versions of Joomla that had reached their end-of-life phase, namely versions 1.5 and 2.5.

Any organization that uses Joomla will want to patch quickly since cybercriminals are moving fast to exploit any security holes. Cid said that as of Dec. 14, “the wave of attacks is even bigger, with basically every site and honeypot we have being attacked. That means that probably every other Joomla site out there is being targeted as well.”

Checking Security Posture

To indicate if you have suffered an attack, look for these three IP addresses: 74.3.170.33, 146.0.72.83 and 194.28.174.106. Sucuri found that these were the IPs that generated hundreds of exploitation requests before the patches and hotfixes were developed.

Sucuri also said that users can check if their websites have actually been compromised by searching the logs for “JDatabaseDriverMysqli” or “O:” in the User Agent. That will detect if the backdoor code has been injected.

“That’s a backdoor that executes any PHP code passed by the POST variable 111,” Cid told Threatpost. He added that Sucuri had released a technical analysis of the flaw for security experts looking to learn more about the vulnerability.

This is the second similar incident where a vulnerability was disclosed and quickly patched in Joomla. In October, cybercriminals started exploiting a SQL injection vulnerability just hours after its details were disclosed. At the time, Sucuri detected attack attempts against all the websites on its network, many of which came from the Tor anonymous network.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today