Joomla! "lang" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA54353

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/54353/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=54353

RELEASE DATE:
2013-08-05
DESCRIPTION:
Emilio Pinna has reported a vulnerability in Joomla!, which can be
exploited by malicious people to conduct cross-site scripting
attacks.

Input passed via the "lang" GET parameter to
/libraries/idna_convert/example.php is not properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.

The vulnerability is reported in version 3.1.5. Other versions may
also be affected.

SOLUTION:
Fixed in the git repository.

PROVIDED AND/OR DISCOVERED BY:
Emilio Pinna

ORIGINAL ADVISORY:
Joomla!:
https://github.com/joomla/joomla-cms/issues/1658

Emilio Pinna:
http://disse.cting.org/2013/08/05/joomla-core-3_1_5_reflected-xss-vulnerability/

RECENT ARTICLE

RECENT POST