SECUNIA ADVISORY ID: SA54353 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/54353/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=54353 RELEASE DATE: 2013-08-05DESCRIPTION: Emilio Pinna has reported a vulnerability in Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the "lang" GET parameter to /libraries/idna_convert/example.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerability is reported in version 3.1.5. Other versions may also be affected. SOLUTION: Fixed in the git repository. PROVIDED AND/OR DISCOVERED BY: Emilio Pinna ORIGINAL ADVISORY: Joomla!: https://github.com/joomla/joomla-cms/issues/1658 Emilio Pinna: http://disse.cting.org/2013/08/05/joomla-core-3_1_5_reflected-xss-vulnerability/