Security Advisory SA53428 – Joomla! jNews Component "get-data" Cross-Site Scripting Vulnerability – Secunia

Description

A vulnerability has been discovered in the jNews component for Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed via the "get-data" parameter to /components/com_jnews/includes/openflashchart/open-flash-chart.swf is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability is confirmed in version 8.0.1. Other versions may also be affected.

Solution No official solution is currently available.

Provided and/or discovered by Deepankar Arora and Rafay Baloch.

Original Advisory http://packetstormsecurity.com/files/121623/Joomla-Jnews-8.0.1-Cross-Site-Scripting.html

Deep Links Links available to Secunia VIM customers

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

The rest is here:
Security Advisory SA53428 - Joomla! jNews Component "get-data" Cross-Site Scripting Vulnerability - Secunia

Related Posts

Comments are closed.