Joomla! URL Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA45295

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/45295/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=45295

RELEASE DATE:
2011-07-23
DESCRIPTION:
Aung Khant has reported a vulnerability in Joomla!, which can be
exploited by malicious people to conduct cross-site scripting
attacks.

Input appended to the URL after index.php is not properly sanitised
in includes/application.php before being returned to the user. This
can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.

The vulnerability is reported in versions prior to 1.7.0.

SOLUTION:
Update to version 1.7.0.

PROVIDED AND/OR DISCOVERED BY:
Aung Khant

ORIGINAL ADVISORY:
Joomla!:
http://developer.joomla.org/security/news/357-20110701-xss-vulnerability.html

Aung Khant:
http://bl0g.yehg.net/2011/07/joomla-170-rc-and-lower-multiple-cross.html

RECENT ARTICLE

RECENT POST