An XSS issue was discovered in VirtueMart before 3.2.14. All the textareas in the backend of the plugin can be closed by simply adding </textarea> to the value and saving the product/config. By editing back the product/config, the editor's browser will execute everything after the </textarea>, leading to a possible XSS.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://imgur.com/a/Hf6JD | third party advisory exploit |
https://www.exploit-db.com/exploits/44625/ | exploit vdb entry third party advisory |
http://virtuemart.net/news/489-virtuemart-3-2-14-security-release-and-enhanced-invoice-handling | vendor advisory |