The Googlemaps plugin before 3.1 for Joomla! allows remote attackers to conduct XML injection attacks via the url parameter to plugin_googlemap2_proxy.php.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2013/Jul/158 | Exploit Mailing List Third Party Advisory |
http://www.mapsplugin.com/Google-Maps/Documentation-of-plugin-Googlemap/security-release-3-1-of-plugin-googlemaps.html | Patch URL Repurposed |
http://www.openwall.com/lists/oss-security/2015/02/26/11 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/02/26/4 | Mailing List Third Party Advisory |
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://www.mapsplugin.com/Google-Maps/Documentation-of-plugin-Googlemap/security-release-3-1-of-plugin-googlemaps.html - Patch, URL Repurposed |
Information
Published : 2017-09-14 16:29
Updated : 2024-02-28 16:04
NVD link : CVE-2013-7429
Mitre link : CVE-2013-7429
CVE.ORG link : CVE-2013-7429
JSON object : View
Products Affected
mapsplugin
- googlemaps
CWE
CWE-91
XML Injection (aka Blind XPath Injection)