SECUNIA ADVISORY ID:
MustLive has discovered a vulnerability in the Joomulus module for
Joomla!, which can be exploited by malicious people to conduct
cross-site scripting attacks.
Input passed via the "tagcloug" parameter to tagcloud_ell.swf,
tagcloud_eng.swf, tagcloud_por.swf, tagcloud_rus.swf, and potentially
tagcloud_jpn.swf in modules/mod_joomulus/ (when "mode" is set to
"tags") is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.
The vulnerability is confirmed in version 2.0. Other versions may
also be affected.
Filter malicious characters and character sequences using a proxy.
PROVIDED AND/OR DISCOVERED BY: