Incapsula Component for Joomla! 'token' Parameter Multiple XSS

Medium Nessus Plugin ID 64484

Synopsis

The remote web server contains a PHP application that is affected by multiple cross-site scripting vulnerabilities.

Description

The version of the Incapsula component for Joomla! running on the remote host is affected by multiple cross-site scripting (XSS) vulnerabilities in the Security.php and Performance.php scripts due to improper sanitization of user-supplied input to the 'token' parameter before using it to generate dynamic HTML content. An unauthenticated, remote attacker can exploit this to inject arbitrary HTML and script code into the user's browser session.

Solution

Upgrade to Joomla! version 1.4.6_c or later.

See Also

https://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5121.php

Plugin Details

Severity: Medium

ID: 64484

File Name: joomla_incapsula_xss.nasl

Version: 1.11

Type: remote

Published: 2013/02/06

Modified: 2018/11/15

Dependencies: 21142

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

CVSS v3.0

Base Score: 4.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/a:joomla:joomla\!

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2012/12/20

Vulnerability Publication Date: 2013/01/08

Reference Information

BID: 57190

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990