icon

We found results for “

CVE-2020-8421

Date: February 6, 2020

Overview

An issue was discovered in Joomla! before 3.9.15. Inadequate escaping of usernames allows XSS attacks in com_actionlogs.

Details

An issue was discovered in Joomla! before 3.9.15. Inadequate escaping of usernames allows XSS attacks in com_actionlogs.

PoC Details

Login to Joomla! as administrator, and create a new user 'test'.
Logout from admin, and login as new user 'test', to create an action log on the admin actionlogs panel.
Now connect to the database, and update the newly created user's DB record in the <joomladb name>.<dbprefix>users table, to the given payload below.
Now, login back as admin and navigate to the action logs page, and see the payload getting executed.

PoC Code

<script>alert(document.cookie)</script>

Affected Environments

Joomla! before 3.9.15

Prevention

Upgrade to Joomla! version 3.9.15

Language: PHP

Good to know:

icon

Cross-Site Scripting (XSS)

CWE-79
icon

Upgrade Version

Upgrade to version 3.9.15

Learn More

Base Score:
Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope (S): Changed
Confidentiality (C): Low
Integrity (I): Low
Availability (A): None
Base Score:
Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (AU): None
Confidentiality (C): None
Integrity (I): Partial
Availability (A): None
Additional information: