On December 14, a new version of Joomla, an open-source content management system (CMS) which allows you to build websites and powerful online applications, was released to patch a critical 0-Day Remote Command Execution (RCE) vulnerability that affects all versions from 1.5 to 3.4.

The vulnerability is due to lack of validation of input objects that can lead to remote command execution. A remote attacker could exploit this vulnerability by sending a malicious request to the victim. The vulnerability was exploited in the wild a few days before a patch was available and, now that the issue is public, is being exploited even more actively and widely.

Check Point released an IPS protection to help site owners defend against attacks until they can patch their Joomla systems.

Check Point IPS Protection

Check Point protects its customers from the Joomla Remote Command Execution vulnerability with the following IPS protection, released on December 15, 2015:

Joomla Object Injection Remote Command Execution: This protection detects and blocks attempts to exploit the remote command execution vulnerability reported in Joomla platforms. It also detects the new Metasploit module, which consists of a real payload which successfully achieves remote command execution.

Check Point Observation & Guidance

Check Point has noted many attack attempts worldwide, which try to exploit this new vulnerability. We recommend activating the above IPS protection in Prevent mode. The following IPs are among the sources of these attacks: 93.179.68.167; 89.76.83.1; 46.148.22.18; 89.248.167.141; 109.201.143.40; 190.114.225.141; 94.102.63.16. We identified attacks coming mostly from hackers in Russia, Ukraine, Poland, Netherlands and Paraguay, directed at potentially vulnerable systems in the US, Europe & Israel.

References


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Please complete the equation to verify your submission. * Time limit is exhausted. Please reload the CAPTCHA.