Yesterday, Melvin Lammerts wrote an article on the account creation with elevated privileges vulnerability in Joomla! < 3.6.4. And included a PoC exploit. This Joomla! vulnerability makes it easy for an attacker to create an user account, even when user registration is turned off. Yikes!
The Joomla security team have just released a new version of Joomla to patch a critical remote command execution vulnerability that affects all versions from 1.5 to 3.4. This is a serious vulnerability that can be easily exploited and is already in the wild.
Joomla websites using the Googlemaps plugin for Joomla are actively abused as open proxy for launching Denial-of-Service (DoS) attacks. Even though the Googlemaps plugin vulnerability
plugin_googlemap2_proxy.php was released over one and a half (1,5) years ago, I still see these DoS-attacks happening on a regular basis…
Joomla! performance tuning on Windows Server IIS: learn how to improve & speed up Joomla! with these 8 simple and important tips. Add caching, gzip compression, set your sessions & optimize MySQL database functions… Provide your visitors with a blazing fast Joomla! website!
How to resolve Joomla! HTTP 500 error after updates? Over the last week we, at Vevida, received quite a lot problem reports by customers who updated Joomla! to version 3.2.0. After logging on to their administrator back-end, they received an HTTP 500.0 error with error code
0x8007000d. Let’s investigate and resolve this Joomla! Administrator login HTTP 500 error.
Web monitory and malware clean up company Sucuri writes about (massive) Joomla Media Manager attacks in the wild. The recent discovered and patched vulnerability in Joomla’s Media Manager is actively exploited.
Update your Joomla site… yet again.
If you run a site powered by the Joomla content management system and haven’t yet applied a critical update for this software released less than two weeks ago, please take a moment to do so: A trivial exploit could let users inject malicious content into your site, turning it into a phishing or malware trap for visitors., Says Brian Krebs
Use GnuWin32 ported tools like grep.exe and find.exe to find backdoor files in websites, check visitor’s IP addresses or hits to backdoors in IIS log files: forensic log analysis with grep. Search for Joomla, WordPress, Drupal PHP backdoors within your website, clean up a hacked website and keep a website secure.
Het Nationaal Cyber Security Center (NCSC) heeft een advisory uitgegeven waarin zij meldt dat zij grootschalige uitbuiting van de Joomla Content Editor (JCE) kwetsbaarheid heeft waargenomen.
The Internet Storm Center reports that a large number of Joomla sites are currently deploying malicious code and infecting visitors with malware; some WordPress sites are also thought to be affected. The German CERT-Bund Computer Emergency Response Team, which is operated by the German Federal Office for Information Security (BSI), has confirmed that similar attacks on and via Joomla servers have also been observed in Germany.