Joomla JS Jobs 1.2.0 Cross Site Scripting

2018.04.06
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79

####################################### # Exploit Title: Joomla! Component JS Jobs 1.2.0 - Cross Site Scripting # Google Dork: N/A # Date: 03-04-2018 ####################################### # Exploit Author: Sureshbabu Narvaneni# ####################################### # Author Blog : http://nullnews.in # Vendor Homepage: https://www.joomsky.com/products/js-jobs.html # Software Link: https://www.joomsky.com/5/download/1.html # Affected Version: 1.2.0 # Category: WebApps # Tested on: Win7 Enterprise x86/Kali Linux 4.12 i686 # CVE : CVE-2018-9183 # # 1. Vendor Description: # # JS Jobs offer to employer to register his company and post jobs. Job seeker register him self and add his resume. # He can search job and apply on it. Employer will get resume in applied resume section. # # 2. Technical Description: # # JS Jobs 1.2.0 is missing validation on URL inserted by attacker/employer while creating company entry. # # 3. Proof Of Concept: # # Create a company entry by logging in as Employer and paste below payload in place of URL field. # # Payload : javascript:alert(1) or data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K # # 4. Solution: # # Upgrade to latest release. # http://www.joomsky.com/5/download/1.html # # 5. Reference: # https://vel.joomla.org/resolved/2146-js-jobs-1-2-0-xss-cross-site-scripting # https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9183 #####################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top