VID |
210069 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Joomla! program is vulnerable to a cross-site scripting vulnerability via the 'order' parameter. Joomla! is an open-source contents management system written in PHP. Joomla! versions prior to 1.0.13 could allow a remote attacker to inject arbitrary web script or HTML, caused by improper validation of user-supplied input passed to the 'order' parameter of the 'components/com_content/content.php' script. This vulnerability could allow a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks. In addition, the installed program may also be vulnerable to multiple security vulnerabilities, including cross-site scripting, HTTP-response-splitting, and session-fixation issues.
* References: http://www.joomla.org/content/view/3670/78/ http://forum.joomla.org/index.php?topic=195272.0 http://secunia.com/advisories/26239
* Platforms Affected: Joomla! versions prior to 1.0.13 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Joomla! (1.0.13 or later), available from the Joomla! Web site at http://www.joomla.org/component/option,com_frontpage/Itemid,1/ |
Related URL |
CVE-2007-4188,CVE-2007-4189,CVE-2007-4190 (CVE) |
Related URL |
25122 (SecurityFocus) |
Related URL |
35686,35687,35688 (ISS) |
|