In the Kunena extension 5.0.2 through 5.0.4 for Joomla!, the forum message subject (aka topic subject) accepts JavaScript, leading to XSS. Six files are affected: crypsis/layouts/message/item/default.php, crypsis/layouts/message/item/top/default.php, crypsis/layouts/message/item/bottom/default.php, crypsisb3/layouts/message/item/default.php, crypsisb3/layouts/message/item/top/default.php, and crypsisb3/layouts/message/item/bottom/default.php. This is fixed in 5.0.5.
References
Link | Resource |
---|---|
http://www.fox.ra.it/technical-articles/kunena-vulnerability-2017-01.html | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/101677 | |
http://www.fox.ra.it/technical-articles/kunena-vulnerability-2017-01.html | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/101677 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.fox.ra.it/technical-articles/kunena-vulnerability-2017-01.html - Exploit, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/101677 - |
Information
Published : 2017-03-22 17:59
Updated : 2024-11-21 03:28
NVD link : CVE-2017-5673
Mitre link : CVE-2017-5673
CVE.ORG link : CVE-2017-5673
JSON object : View
Products Affected
kunena
- kunena
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')