Centrora Blog

Software updates, research updates and latest news will be shared here.

Platform: Joomla component Simple Membership 3.3.3

Attack Type:

  • Cross site scripting
  • Cross site request forgery
  • SQL injection
  • Local file inclusion
  • Layer 2 intrusion

Source: https://www.exploit-db.com/exploits/41599/

Proof of concept:
http://
targetsite/index.php?option=com_simplemembership&Itemid=1&task=showUsersProfile&userId=/*!50000Procedure*/+/*!50000Analyse*/+(extractvalue(0,/*!50000concat*/(0x27,0x496873616e2053656e63616e,0x3a,database())),0)

What can an attacker do with the attack?

Joomla websites with the component Simple membership 3.3.3 is vulnerable to the SQL injection attack. This vulnerability exists because the variable userId is not validated and used without sanitising in the database query. This allows an unauthenticated user to execute arbitrary SQL commands via the parameters userId.

Can centrora detect the attack?

Yes, centrora can detect this attacks under the category of SQL injection.

Following are the contents of attack that are detected by the centrora.