An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in an XSS vulnerability.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/104269 | vdb entry third party advisory |
https://developer.joomla.org/security-centre/736-20180508-core-possible-xss-attack-in-the-redirect-method.html | vendor advisory |
http://www.securitytracker.com/id/1040966 | vdb entry third party advisory |