Cross-site scripting (XSS) vulnerability in admin.jcomments.php in the JoomlaTune JComments (com_jcomments) component 2.1.0.0 for Joomla! allows remote authenticated users to inject arbitrary web script or HTML via the name parameter to index.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://secunia.com/advisories/39842 | third party advisory vendor advisory |
http://packetstormsecurity.org/1005-exploits/joomlajcomments-xss.txt | |
http://www.joomlatune.com/jcomments-v.2.2-release-notes.html | |
http://www.htbridge.ch/advisory/xss_vulnerability_in_jcomments_joomla.html | exploit |
http://www.securityfocus.com/bid/40230 | patch vdb entry exploit |
http://www.securityfocus.com/archive/1/511320/100/0/threaded | mailing list |