We found results for “”
CVE-2020-8421
Date: February 6, 2020
Overview
An issue was discovered in Joomla! before 3.9.15. Inadequate escaping of usernames allows XSS attacks in com_actionlogs.Details
An issue was discovered in Joomla! before 3.9.15. Inadequate escaping of usernames allows XSS attacks in com_actionlogs.PoC Details
Login to Joomla! as administrator, and create a new user 'test'.Logout from admin, and login as new user 'test', to create an action log on the admin actionlogs panel.
Now connect to the database, and update the newly created user's DB record in the <joomladb name>.<dbprefix>users table, to the given payload below.
Now, login back as admin and navigate to the action logs page, and see the payload getting executed.
PoC Code
<script>alert(document.cookie)</script>
Affected Environments
Joomla! before 3.9.15Prevention
Upgrade to Joomla! version 3.9.15Language: PHP
Good to know:
Base Score: |
|
---|---|
Attack Vector (AV): | Network |
Attack Complexity (AC): | Low |
Privileges Required (PR): | None |
User Interaction (UI): | Required |
Scope (S): | Changed |
Confidentiality (C): | Low |
Integrity (I): | Low |
Availability (A): | None |
Base Score: |
|
---|---|
Access Vector (AV): | Network |
Access Complexity (AC): | Medium |
Authentication (AU): | None |
Confidentiality (C): | None |
Integrity (I): | Partial |
Availability (A): | None |
Additional information: |