Matt Posted August 6, 2013 Report Posted August 6, 2013 Description : Joomla versions 3.1.5 and below suffer from a reflective cross site scripting vulnerability in example.php. Author : Emilio PinnaSource : Joomla 3.1.5 Cross Site Scripting ? Packet StormCode : ============================================================- Original release date: August 05, 2013- Discovered by: Emilio Pinna (Application Security Analyst at Abinsula)- Contact: (emilio (dot) pinn (at) gmail (dot) com)- Severity: 4.3/10 (Base CVSS Score)============================================================VULNERABILITY-------------------------Joomla core package <= 3.1.5 includes a PHP script that suffers fromreflected XSS vulnerability that allows to inject HTML and maliciousscripts that can access any cookies, session tokens, or othersensitive information retained by your browser and used with thatsite.Joomla is one of the most installed CMS with dozens of millions ofinstallations.DESCRIPTION-------------------------Affected file libraries/idna_convert/example.php has different injection points:- Unsanitized lang parameter in line 24- Unsanitized file name printing on lines 112 and 119PROOF OF CONCEPT-------------------------http://localhost/joomla/libraries/idna_convert/example.php?lang="><script>alert(document.cookie);</script><!--BUSINESS IMPACT-------------------------As usual, attackers can exploit these weaknesses to execute arbitraryHTML and script code in a user's browser session that visits themalicious crafted url.SYSTEMS AFFECTED-------------------------Joomla-CMS <= 3.1.5SOLUTION-------------------------Fixed removing the vulnerable example file on git with commitc00c033d33d901e1ca6be9061a44e55acd041b1fREFERENCES-------------------------http://disse.cting.org/2013/08/05/joomla-core-3_1_5_reflected-xss-vulnerability/https://github.com/joomla/joomla-cms/issues/1658CREDITS-------------------------Emilio Pinna (emilio (dot) pinn (at) gmail (dot) com)DISCLOSURE TIMELINE-------------------------August 4, 2013: Opened a ticket describing the bug by Adam Willard.August 5, 2013: Fixed by Michael Babker.August 5, 2013: Vulnerability disclosed by Emilio Pinna.LEGAL NOTICES-------------------------The information contained within this advisory is supplied "as-is"with no warranties or guarantees of fitness of use or otherwise. Quote