Joomla! Phocagallery Component "id" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID:
SA53382

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/53382/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=53382

RELEASE DATE:
2013-05-14
DESCRIPTION:
A vulnerability has been discovered a vulnerability in the
Phocagallery component for Joomla!, which can be exploited by
malicious people to conduct cross-site scripting attacks.

Input passed via the "id" parameter to
/components/com_phocagallery/assets/plupload/plupload.flash.swf is
not properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

The vulnerability is confirmed in version 3.2.3. Other versions may
also be affected.

SOLUTION:
No official solution is currently available.

PROVIDED AND/OR DISCOVERED BY:
Rafay Baloch and Deepankar Arora

ORIGINAL ADVISORY:
http://packetstormsecurity.com/files/121606/Joomla-Phocagallery-3.0.0-4.0.0-Cross-Site-Scripting.htm

RECENT ARTICLE

RECENT POST