SECUNIA ADVISORY ID: SA49678 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49678/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49678 RELEASE DATE: 2012-07-02DESCRIPTION: Stefan Schurtz has discovered a vulnerability in Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the URL to index.php is not properly sanitised in modules/mod_languages/tmpl/default.php before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Successful exploitation requires the Language Switcher module to be enabled (not enabled by default). The vulnerability is confirmed in version 2.5.6. Other versions may also be affected. SOLUTION: No official solution is currently available. PROVIDED AND/OR DISCOVERED BY: Stefan Schurtz ORIGINAL ADVISORY: http://www.darksecurity.de/advisories/2012/SSCHADV2012-014.txt