Joomla! libraries/idna_convert/example.php lang Parameter XSS

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote web server hosts a PHP script that is affected by a
cross-site scripting vulnerability.

Description :

The version of Joomla! installed on the remote host is affected by a
cross-site scripting vulnerability because the application fails to
properly sanitize user-supplied input to the 'lang' parameter of the
'libraries/idna_convert/example.php' script. An attacker may be able to
leverage this issue to inject arbitrary HTML and script code into a
user's browser to be executed within the security context of the
affected site.

See also :

http://www.nessus.org/u?0af472dd
https://github.com/joomla/joomla-cms/issues/1658

Solution :

Unknown at this time. It's suggested that the script be removed.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 69280 ()

Bugtraq ID: 61600

CVE ID: CVE-2013-5583