Need help? Call us on 1300 789 260

Joomla Remote Code Execution Vulnerability

Difficulty: Intermediate

Prerequisites

  • Joomla Administrator Access
  • Hosting Control Panel details
  • FTP details

Overview

The Joomla security team have just released a CRITICAL patch to fix a Remote Code Execution vulnerability within Joomla. This affects every version from 1.5 through to 3.4.5 (including 2.5 releases).

This exploit is already out in the wild and you may already be compromised .

Further Reading: https://blog.sucuri.net/2015/12/remote-command-execution-vulnerability-in-joomla.html

What do I need to do

  1. Update Joomla to 3.4.6 or apply the patch for Joomla 1.5 / 2.5
  2. Update MySQL User Password for Joomla Database
  3. Update FTP Password
  4. Scan for malicious files

Instructions

  1. Update Joomla or apply patch (As with applying any updates BACKUP is step 1).
  2. Update the MySQL user password:
    1. Follow our How-To guide here: https://www.conetix.com.au/support/article/how-update-mysql-password-database-user-plesk
    2. Once updated edit the configuration.php via FTP or Hosting panel and update with your New MySQL password
  3. Update FTP Password (only required if the password exists in the configuration.php)
    1. Follow our How-To guide here: https://www.conetix.com.au/support/article/how-change-ftp-password-plesk
    2. Once updated edit the configuration.php via FTP or Hosting panel and update with your New FTP password.
  4. Scan for any files which have been modified or new files added. If you need assistance with this, please contact the Conetix Support Team .

Note: All Conetix Customers on a Managed Joomla plan have already had these procedures applied and 100% protected.

Was this article helpful? Yes No
👥

Having trouble? We’re here to help!

We’ve built our company with a serious focus on quality service. Feel free to give us a call!

1300 789 260