Joomla! < 1.5.11 JA_Purity Template Multiple XSS

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.


Synopsis :

The remote web server contains a PHP application that is affected by
multiple cross-site scripting vulnerabilities.

Description :

The version of Joomla! running on the remote host is prior to 1.5.11.
It is, therefore, affected by multiple, persistent cross-site
scripting (XSS) vulnerabilities in the JA_Purity template. An
unauthenticated, remote attacker can exploit these, by convincing a
user to follow a specially crafted URL, to inject arbitrary HTML and
script code into the user's cookie, making the attack persistent for
the entire browser session.

Note that this version of Joomla! may be affected by additional
cross-site scripting vulnerabilities
however, Nessus has not checked
for these.

See also :

http://seclists.org/bugtraq/2009/Jun/64
http://www.nessus.org/u?dc0c512c
http://www.nessus.org/u?e94ed320

Solution :

Upgrade to Joomla! version 1.5.11 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 39331 (joomla_ja_purity_xss.nasl)

Bugtraq ID: 35189

CVE ID: CVE-2009-1939

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now