Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Access Control Bypass Flaw Patched in Akeeba Backup for Joomla

After being notified by researchers at Sucuri, the developers of the Akeeba backup extension for Joomla fixed a vulnerability that can be leveraged to gain access to website backups.

After being notified by researchers at Sucuri, the developers of the Akeeba backup extension for Joomla fixed a vulnerability that can be leveraged to gain access to website backups.

Akeeba Backup for Joomla, which has been downloaded more than 8 million times, is an open-source extension that can be used to create complete or partial backups for websites powered by Joomla.  The security hole found by Sucuri can be exploited download the backups, which can contain database passwords, user credentials with hashed passwords, and password-reset tokens (also hashed).

The vulnerability, which affects the JSON remote API that’s available when users enable front-end backups, has been rated by the security firm as low risk because it’s very difficult to exploit. This is most likely why it remained undetected for four years.

Marc-Alexandre Montpas, the Sucuri researcher who discovered the flaw, noted that only an experienced cryptanalyst can understand how the attack works.

“The extension contains a full-blown JSON API which allows its users to easily set-up some remote automatic backup system. It also implements some advanced encryption mechanism (using AES with the Cipher-block chaining (CBC) and Counter (CTR) encryption modes) intended to provide a safe way to prevent eavesdroppers from stealing backup for websites that does not have a SSL certificate,” Montpas explained in a blog post.

“The problem was located in the way they handled user authentication when an encrypted request was received. The extension would simply not go through the authentication routine based on the assumption that if the user was able to send a valid encrypted JSON payload, he knows the website’s secret key, and if he knows that piece of information it is a legit user,” he added.

According to the researcher, an attacker could communicate with the API just like a legitimate user after obtaining another key by brute-forcing valid encrypted JSON payloads one character at a time. Being able to communicate with the API gives the attacker the ability to bypass cryptographic protections for password reset requests.

Akeeba developers have clarified that the vulnerability can’t be exploited to directly hack a website.

Advertisement. Scroll to continue reading.

“At worst, a successful attacker would get access to your backups. They would not be able to write anything to your site’s disk or database, therefore they can’t directly hack your site,” they wrote in an advisory published last week. “A determined, well-staffed and well-funded opponent (criminal network, enterprise actor or state actor) could use this information to manually attempt to detect a different attack vector to hack your site. In so many words, no, it’s not realistic to say that your site is in danger.”

Users are advised to update their installations to Akeeba Backup for Joomla 3.11.x. The updates can be installed by accessing the “Updates” menu in the extensions manager.

This isn’t the first time Sucuri researchers uncover vulnerabilities in popular extensions. Over the past months, they’ve uncovered flaws in several WordPress plugins, including MailPoet, Custom Contact Forms and WordPress Mobile Pack.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.