The cross-site scripting (XSS) countermeasures in class.inputfilter.php in Joomla! 1.0.7 allow remote attackers to cause a denial of service via a crafted mosmsg parameter to index.php with a malformed sequence of multiple tags, as demonstrated using "<<>AAA<><>", possibly due to nested or empty tags.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/426538/100/0/threaded | mailing list |
http://www.osvdb.org/23816 | vdb entry exploit |
http://www.joomla.org/content/view/938/78/ |