Skip to main content

Whaddya know how to fix Joomla CMS javascript latest vulnerabilities?

I have a client that have asked me to assist them fixing their "hacked" website through vulnerabilities of old version of Joomla CMS. I said you should always apply the latest release of Joomla, they are very active in patching security vulnerabilities.

I analyzed their website using an online scanning tool Unmask Parasites for quick security check. This is an excellent tool in addition to what I have right now. I can easily find out if the website is hacked through javascript injection. When you check your website, for example checking you should see a report that says something like this "This page seems to be clean" or "This page seems to be suspicious" . If clean, you're in the right direction managing your website and nothing to worry abou. If suspicious, continue reading the report and look for Suspicious Inline Script.

For this specific Joomla vulnerability, here's an example of hijacking javascript codes. Please note, I removed the bad codes so I can only show the beginning of the script to guide you.
Here's suspicious javascript code sample:
eval (String.fromCharCode(118,97,114 ... etc.)

What happen if you have this javascript code injected to your website?
When someone visited your website, the javascript code will automatically try to download a program by simply asking the user to click the page. If your visitor "accidentally" accept (click) the program, your visitor workstation Internet browser is now HIJACKED! (Read here on how to remove Spyware Protect 2009). This mean that everytime they open an internet browser (ex. IE), they will ask you to install the fake antivirus program and start showing annoying advertisement. That is bad for your website.

If you have this javascripts injected to your website, here's a quick solution to fix this issue. After this quickfix, you "MUST" install the latest release of Joomla CMS.

You can edit your Joomla files through FTP or Putty (SSH) program.
01. Check your index.html or index.php in your website root directory e.g public_html/index.php or index.html.
02. Look for the javascript appended to the last portion of the index.html or index.php file.
03. If you see any javascript codes that should not be there, remove it and save your file.
ex. bad javascript codes:

04. CHMOD your index.php or index.html to 444, this means to not allow modifying the file.
ex. command:
chmod 444 index.php or chmod 444 index.html.
05. Check your templates folder e.g. public_html/templates/folder; where folder is the actual templates folder.
06. Check the index.php or index.html and repeat the process between item 02 to 04.

You are safe at this point.

Security Assessment (Testing) for your website:
You can check your website if you fully removed the injected javascript codes by using the recommended testing.
- Visit for a quick online security check. Read the report.
- Visit your website, click the page view source to check your website. The first option is the most easy approach to check your website.
- If you have up-to-date antivirus software installed to your workstation, visiting your website will alert you if you're infected or not. They work most of the time but not completely accurate because some malware dissable antivirus program in some instances.

Now what's next?
01. You need to be proactive to protect your business (website), subscribe to Joomla Security News.
02. Install the latest released of Joomla CMS.
03. Share this article to all Joomla webmasters, so we can help them minimize risk of exposures.
04. and continue reading KING.NET Securiy AlertCon articles.


Popular posts from this blog

Alternative Social Networks

If you are planning to create your social network e.g. similar to Facebook. Here's a short list of alternative software's:

Open Source and Free​ - Wordpress (Open Source and Free) - (Open Source and Free)Commercial Social Networks software ($299 Stand Alone, $29/mo Cloud) (run with Joomla, need to know CMS) (very expensive, $399 for Standard) (from free to Commercial, I left my networks and they are selling it (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) (I don't recommend using this service, it's hard to export your data when it's time to move)Something to check when selecting your next soc…

Example of Out of Office Reply for Terminated Employee

This is a sample message that I used for terminated employees, unless HR staff specified a different message.
=== Example for KING.NET Employee === John Doe (employee or consultant) is no longer with KING.NET effective June 1, 2008 (termination date). For matters relating to "Project Name here" please direct your concerns to John Smith at (Manager or Supervisor). For all other matters, please direct your email to Mary Smith HR at
Please call our main office 703-345-6789 if you have other concerns.
Thank you.
=== end of message ===

Frequent Account Lockout in Active Directory

I have a user in Windows Pro 7, and Windows Server 2003 environment that is frequently account locked out. I tried many different scenarios to resolve this account lockout issue, from resetting his password, changing a new password, remove and re-join the domain, rebooting the workstation and active directory servers.

I tried to use the command prompt utility to run "rundll32.exe keymgrdll, KRShowKeyMgr" (case sensitive) to delete the account in Windows 7 password cache, and still no luck.

Still searching for answer ... Let me know if you encounter a similar issue in Windows Pro 7 and Windows Server 2003.

Continue reading updated post here: