Joomla! com_content Component (components/com_content/content.php) order Parameter XSS

This script is Copyright (C) 2007-2012 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a PHP script that is affected by a
cross-site scripting vulnerability.

Description :

The version of Joomla installed on the remote host fails to sanitize
user-supplied input to the 'order' parameter before using it in the
'components/com_content/content.php' script to generate dynamic
output. An unauthenticated, remote attacker may be able to leverage
this issue to inject arbitrary HTML or script code into a user's
browser to be executed within the security context of the affected
site.

In addition, the application may also be affected by a session
fixation vulnerability in the administrator application as well as
several other cross-site scripting and cross-site request forgery
vulnerabilities, although Nessus did not test for them.

See also :

http://www.nessus.org/u?dadacc25
http://forum.joomla.org/index.php?topic=195272.0

Solution :

Upgrade to Joomla 1.0.13 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 25823 (joomla_order_xss.nasl)

Bugtraq ID: 25122

CVE ID: CVE-2007-4189