SECUNIA ADVISORY ID: SA53382 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/53382/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=53382 RELEASE DATE: 2013-05-14DESCRIPTION: A vulnerability has been discovered a vulnerability in the Phocagallery component for Joomla!, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the "id" parameter to /components/com_phocagallery/assets/plupload/plupload.flash.swf is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerability is confirmed in version 3.2.3. Other versions may also be affected. SOLUTION: No official solution is currently available. PROVIDED AND/OR DISCOVERED BY: Rafay Baloch and Deepankar Arora ORIGINAL ADVISORY: http://packetstormsecurity.com/files/121606/Joomla-Phocagallery-3.0.0-4.0.0-Cross-Site-Scripting.htm