Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1280434049.193561.1294340814006.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Thu, 6 Jan 2011 14:06:54 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>, lists@...g.net
Subject: Re: CVE Request for Joomla! 1.0.x ~ 1.0.15 | Cross
 Site Scripting (XSS) Vulnerability

Please use CVE-2011-0005.

Thanks.

-- 
    JB


----- Original Message -----
> http://seclists.org/fulldisclosure/2011/Jan/43
> 
> http://yehg.net/lab/pr0js/advisories/joomla/core/%5Bjoomla_1.0.x~15%5D_cross_site_scripting
> 
> 
> 
> ==============================================================================
> Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability
> ==============================================================================
> 
> 
> 1. OVERVIEW
> 
> The Joomla! 1.0.x series are currently vulnerable to Cross Site
> Scripting.
> 
> 
> 2. BACKGROUND
> 
> Joomla! is a free and open source content management system (CMS) for
> publishing content on the World Wide Web and intranets.
> 
> 
> 3. VULNERABILITY DESCRIPTION
> 
> The "ordering" parameter in a core module,com_search, is not properly
> sanitized and thus vulnerable to XSS.
> By leveraging this vulnerability, attackers can compromise currently
> logged-in user/administrator session and impersonate arbitrary user
> actions available under /administrator/ functions. As the
> vulnerability is based on the core module, it affects both classic and
> customized Joomla! 1.0.x based web sites.
> 
> 
> 4. VERSIONS AFFECTED
> 
> Joomla! 1.0.x ~ 1.0.15 series
> 
> 
> 5. PROOF-OF-CONCEPT/EXPLOIT
> 
> http://attacker.in/joomla1015/index.php?option=com_search&searchword=xss&searchphrase=any&ordering=newest%22%20onmousemove=alert%28document.cookie%29%20style=position:fixed;top:0;left:0;width:100%;height:100%;%22
> 
> 
> 6. SOLUTION
> 
> Joomla 1.0.x series has been at end of life since 2009-07-22.
> 
> Upgrade to Joomla! 1.5.x family (1.5.22 as of 2011-01-06)
> 
> 
> 7. VENDOR
> 
> Joomla! Developer Team
> http://www.joomla.org
> 
> 
> 8. CREDIT
> 
> This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
> Ethical Hacker Group, Myanmar.
> 
> 
> 9. DISCLOSURE TIME-LINE
> 
> 2011-01-03: notified Joomla! Security Strike Team regardless of EOL
> status
> 2011-01-06: vulnerability disclosed
> 
> 
> 10. REFERENCES
> 
> Original Advisory URL:
> http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.0.x~15]_cross_site_scripting
> Joomla! 1.0.x End of Life -
> http://community.joomla.org/blogs/community/509-an-old-friend-comes-of-age.html
> OWASP Top 10:
> http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
> CWE-79: http://cwe.mitre.org/data/definitions/79.html
> 
> 
> #yehg [2011-01-06]
> 
> ---------------------------------
> Best regards,
> YGN Ethical Hacker Group
> Yangon, Myanmar
> http://yehg.net
> Our Lab | http://yehg.net/lab
> Our Directory | http://yehg.net/hwd

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.