{"id":1836,"date":"2014-01-14T12:47:38","date_gmt":"2014-01-14T19:47:38","guid":{"rendered":"http:\/\/www.whitefirdesign.com\/blog\/?p=1836"},"modified":"2014-01-14T13:16:18","modified_gmt":"2014-01-14T20:16:18","slug":"vulnerability-in-joomla-1-6-1-7-and-2-5-0-2-5-2-being-exploited-now","status":"publish","type":"post","link":"https:\/\/www.whitefirdesign.com\/blog\/2014\/01\/14\/vulnerability-in-joomla-1-6-1-7-and-2-5-0-2-5-2-being-exploited-now\/","title":{"rendered":"Vulnerability in Joomla 1.6, 1.7, and 2.5.0-2.5.2 Being Exploited Now"},"content":{"rendered":"<p>When people contact us about hacked website they often state that there website must have been hacked due to running an outdated version of a CMS (WordPress, Joomla, Drupal, etc.). In most cases this isn&#8217;t true; there are a number of other issues that lead to most hackings. Unfortunately there are a lot of people providing security advice &#8211; including web hosts and security companies &#8211; who don&#8217;t know what they are talking about that will tell people that website must have been hacked due to an outdated CMS without actually determining that, which likely leads to the people contacting us believing that. Because we actually determine how a website gets hacked we actually know when it is a vulnerability in an outdated version of a CMS that is at fault and it is worth mentioning.<\/p>\n<p>Based on a website we just cleaned up we can see that a vulnerability that existed in Joomla 1.6, 1.7, and 2.5.0-2.5.2 is actively being exploited now. The <a href=\"http:\/\/jeffchannell.com\/Joomla\/joomla-161725-privilege-escalation-vulnerability.html\">vulnerability<\/a> isn&#8217;t new; it was publicly disclosed on March 15, 2012. Exploitation of the vulnerability isn&#8217;t new either; we found that the website had also been exploited in July and August of last year. The vulnerability allows a hacker to register a new user with &#8220;Administrator&#8221; privileges and then they can use the access provided by that user for malicious purposes. The best way to protect your website against the vulnerability is to <a href=\"http:\/\/docs.joomla.org\/J2.5:Upgrading_from_an_existing_version\">upgrade<\/a> to the latest version of Joomla 2.5, as number of other security issues have been fixed in subsequent version. If you are unable to do that in a timely manner, <a href=\"http:\/\/docs.joomla.org\/Disabling_user_registration\">disabling user registration<\/a> should protect the website as that will block a hacker from being able to register a new user.<\/p>\n<h2 id=\"determining-how-a-website-got-hacked\">Determining How a Website Got Hacked<\/h2>\n<p>One of the first things we do when trying to determine how a website is hacked is to look over the files. Most hacks are contained in the files and the metadata and location of the files can provide important information. In some cases the ownership of the file will point to a possible source. In other cases the last modified date on the file can be used to narrow where we need to start looking in the log files for indication of the source. In some cases the hacker sets the last modified dates on files to match other files so that cannot be done. If a hacker is using a backdoor script that they placed on the website, which allows them remote access to the website, we can find that access in the logs. In this case the last modified dates had not been tampered with by the hacker and backdoor script had been accessed, so we had a good starting point.<\/p>\n<p>First up we spotted the first access to the backdoor script in the log of requests to the website (we replaced some of the identifying information from the log entries shown):<\/p>\n<p>78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:31 -0700] &#8220;GET example.com\/modules\/mod_administrator\/config.php HTTP\/1.1&#8221; 200 189 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 9 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/modules\/mod_administrator\/config.php&#8221; 11922<\/p>\n<p>The entries right before that shed more light on the situation. They show that the same person had just logged in to the administrator area of Joomla and installed an extension. The extension they installed would have contained the backdoor script that they would access right afterwards.<\/p>\n<p>78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:22 -0700] &#8220;GET example.com\/administrator\/index.php HTTP\/1.1&#8221; 200 4362 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 0 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 1344521<br \/>\n78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:23 -0700] &#8220;POST example.com\/administrator\/index.php HTTP\/1.1&#8221; 303 220 &#8220;http:\/\/example.com\/administrator\/&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 1 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 536578<br \/>\n78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:24 -0700] &#8220;GET example.com\/administrator\/index.php HTTP\/1.1&#8221; 200 31537 &#8220;http:\/\/example.com\/administrator\/&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 2 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 1282790<br \/>\n78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:26 -0700] &#8220;GET example.com\/administrator\/index.php HTTP\/1.1&#8221; 200 31537 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 3 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 231378<br \/>\n78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:27 -0700] &#8220;GET example.com\/administrator\/index.php?option=com_installer HTTP\/1.1&#8221; 200 23546 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 4 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 743778<br \/>\n78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:28 -0700] &#8220;POST example.com\/administrator\/index.php?option=com_installer&amp;view_install HTTP\/1.1&#8221; 303 504 &#8220;mainaadmin\/administrator\/&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 5 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 1080171<br \/>\n78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:29 -0700] &#8220;GET example.com\/administrator\/index.php?option=com_installer&amp;view=install HTTP\/1.1&#8221; 200 23817 &#8220;mainaadmin\/administrator\/&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 6 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 199474<br \/>\n78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:29 -0700] &#8220;POST example.com\/administrator\/index.php HTTP\/1.1&#8221; 200 23554 &#8220;http:\/\/example.com\/administrator\/index.php?option=com_installer&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 7 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 500162<br \/>\n78.47.55.70 &#8211; &#8211; [07\/Jan\/2014:03:53:30 -0700] &#8220;GET example.com\/administrator\/index.php?option=com_installer&amp;view_install HTTP\/1.1&#8221; 200 23529 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 8 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/administrator\/index.php&#8221; 172137<\/p>\n<p>Those log entries contained the username of the user that had accessed the admin, mainaadmin. With that we could take a look at the details for that user in the database to get some idea of if the user is an account that was comprised or a malicious account. The email address,\u00a0ivan.kachelya@yandex.ru, was from a Russian website, so that made it likely that it was a malicious user as the website is a locally focused US website with a webmaster in the US. Also included in the data is the date the account was registered, which we could then use to see how the account was created in the log file.<\/p>\n<p>The log files showed the user being created through the User Registration page:<\/p>\n<p>94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:34 -0700] &#8220;GET example.com\/index.php?option=com_users&amp;view=registration HTTP\/1.1&#8221; 200 9676 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 0 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 2302755<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:36 -0700] &#8220;POST example.com\/index.php?option=com_users&amp;task=registration.register HTTP\/1.1&#8221; 303 231 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 1 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 409104<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:37 -0700] &#8220;GET example.com\/component\/users\/?view=registration HTTP\/1.1&#8221; 200 9611 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 2 &#8220;redirect-handler&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 279085<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:37 -0700] &#8220;POST example.com\/index.php?option=com_users&amp;task=registration.register HTTP\/1.1&#8221; 303 247 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 3 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 1082792<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:38 -0700] &#8220;GET example.com\/component\/users\/?view=registration&amp;layout=complete HTTP\/1.1&#8221; 200 5977 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 4 &#8220;redirect-handler&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 290820<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:39 -0700] &#8220;GET example.com\/index.php?option=com_user&amp;view=register HTTP\/1.1&#8221; 302 201 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 5 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 125098<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:39 -0700] &#8220;GET example.com\/index.php?option=com_content&amp;view=article&amp;id=26&amp;Itemid=162 HTTP\/1.1&#8221; 200 14916 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 6 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 799530<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:40 -0700] &#8220;POST example.com\/index.php?option=com_user HTTP\/1.1&#8221; 200 7318 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 7 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 586594<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:41 -0700] &#8220;POST example.com\/index.php?option=com_user HTTP\/1.1&#8221; 200 7318 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 8 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 496821<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:44 -0700] &#8220;GET example.com\/index.php?option=com_users&amp;view=registration HTTP\/1.1&#8221; 200 9539 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 9 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 288962<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:44 -0700] &#8220;POST example.com\/index.php?option=com_users&amp;task=registration.register HTTP\/1.1&#8221; 303 231 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 10 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 306529<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:45 -0700] &#8220;GET example.com\/component\/users\/?view=registration HTTP\/1.1&#8221; 200 9611 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 11 &#8220;redirect-handler&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 294107<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:45 -0700] &#8220;POST example.com\/index.php?option=com_users&amp;task=registration.register HTTP\/1.1&#8221; 303 231 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 12 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 305668<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:46 -0700] &#8220;GET example.com\/component\/users\/?view=registration HTTP\/1.1&#8221; 200 9609 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 13 &#8220;redirect-handler&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 278854<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:46 -0700] &#8220;GET example.com\/index.php?option=com_user&amp;view=register HTTP\/1.1&#8221; 302 201 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 14 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 61939<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:47 -0700] &#8220;GET example.com\/index.php?option=com_content&amp;view=article&amp;id=26&amp;Itemid=162 HTTP\/1.1&#8221; 200 14722 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 15 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 298259<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:47 -0700] &#8220;POST example.com\/index.php?option=com_user HTTP\/1.1&#8221; 200 7318 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 16 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 497553<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:48 -0700] &#8220;POST example.com\/index.php?option=com_user HTTP\/1.1&#8221; 200 7318 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 17 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 527134<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:50 -0700] &#8220;GET example.com\/index.php?option=com_users&amp;view=registration HTTP\/1.1&#8221; 200 9601 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 18 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 263082<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:51 -0700] &#8220;POST example.com\/index.php?option=com_users&amp;task=registration.register HTTP\/1.1&#8221; 303 231 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 19 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 313744<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:51 -0700] &#8220;GET example.com\/component\/users\/?view=registration HTTP\/1.1&#8221; 200 9611 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 20 &#8220;redirect-handler&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 291806<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:52 -0700] &#8220;POST example.com\/index.php?option=com_users&amp;task=registration.register HTTP\/1.1&#8221; 303 231 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 21 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 335271<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:52 -0700] &#8220;GET example.com\/component\/users\/?view=registration HTTP\/1.1&#8221; 200 9609 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 22 &#8220;redirect-handler&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 279791<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:53 -0700] &#8220;GET example.com\/index.php?option=com_user&amp;view=register HTTP\/1.1&#8221; 302 201 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 23 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 78710<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:53 -0700] &#8220;GET example.com\/index.php?option=com_content&amp;view=article&amp;id=26&amp;Itemid=162 HTTP\/1.1&#8221; 200 14722 &#8220;-&#8221; &#8220;Opera\/9.80 (Windows NT 6.0) Presto\/2.12.388 Version\/12.14&#8221; 24 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 364741<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:54 -0700] &#8220;POST example.com\/index.php?option=com_user HTTP\/1.1&#8221; 200 7318 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 25 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 475204<br \/>\n94.244.157.180 &#8211; &#8211; [04\/Jan\/2014:07:43:54 -0700] &#8220;POST example.com\/index.php?option=com_user HTTP\/1.1&#8221; 200 7318 &#8220;http:\/\/example.com&#8221; &#8220;Mozilla\/5.0 (Windows NT 6.1) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/30.0.1599.69 Safari\/537.36&#8221; 26 &#8220;x-httpd-php&#8221; &#8220;\/var\/chroot\/home\/content\/59\/2190232\/html\/index.php&#8221; 502942<\/p>\n<p>Normally a user created that way would not be an &#8220;Administrator&#8221;, which this user was, so we checked to make sure that the registration settings had not been set to do that and there were not. The question then was how the user became an &#8220;Administrator&#8221;. A likely source would be a privilege escalation vulnerability that would allow a lower level user to change their account to have &#8220;Administrator&#8221; privileges. A quick check for Joomla privilege escalation brought the <a href=\"http:\/\/jeffchannell.com\/Joomla\/joomla-161725-privilege-escalation-vulnerability.html\">vulnerability<\/a> we mentioned earlier. The Joomla version in use was a vulnerable version and the log of the user registration appears to match with what needs to be done to exploit the vulnerability, so we then had the likely source of the hack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When people contact us about hacked website they often state that there website must have been hacked due to running an outdated version of a CMS (WordPress, Joomla, Drupal, etc.). In most cases this isn&#8217;t true; there are a number of other issues that lead to most hackings. Unfortunately there are a lot of people &hellip; <a href=\"https:\/\/www.whitefirdesign.com\/blog\/2014\/01\/14\/vulnerability-in-joomla-1-6-1-7-and-2-5-0-2-5-2-being-exploited-now\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Vulnerability in Joomla 1.6, 1.7, and 2.5.0-2.5.2 Being Exploited Now&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,15],"tags":[],"class_list":["post-1836","post","type-post","status-publish","format-standard","hentry","category-joomla","category-website-security"],"_links":{"self":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/1836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/comments?post=1836"}],"version-history":[{"count":12,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/1836\/revisions"}],"predecessor-version":[{"id":1848,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/posts\/1836\/revisions\/1848"}],"wp:attachment":[{"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/media?parent=1836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/categories?post=1836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whitefirdesign.com\/blog\/wp-json\/wp\/v2\/tags?post=1836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}