Multiple cross-site scripting (XSS) vulnerabilities in helpers/comment.php in the StackIdeas Komento (com_komento) component before 2.0.5 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) img or (2) url tag of a new comment.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2015/Oct/11 | Mailing List Third Party Advisory VDB Entry |
https://stackideas.com/changelog/komento?version=2.0.5 | Release Notes Vendor Advisory |
https://www.davidsopas.com/komento-joomla-component-persistent-xss/ | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2015/Oct/11 | Mailing List Third Party Advisory VDB Entry |
https://stackideas.com/changelog/komento?version=2.0.5 | Release Notes Vendor Advisory |
https://www.davidsopas.com/komento-joomla-component-persistent-xss/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 02:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2015/Oct/11 - Mailing List, Third Party Advisory, VDB Entry | |
References | () https://stackideas.com/changelog/komento?version=2.0.5 - Release Notes, Vendor Advisory | |
References | () https://www.davidsopas.com/komento-joomla-component-persistent-xss/ - Exploit, Third Party Advisory |
Information
Published : 2017-12-27 19:29
Updated : 2024-11-21 02:36
NVD link : CVE-2015-7324
Mitre link : CVE-2015-7324
CVE.ORG link : CVE-2015-7324
JSON object : View
Products Affected
stackideas
- komento
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')