Joomla! Component JS Jobs 1.2.0 – Cross-Site Scripting

  • 作者: Sureshbabu Narvaneni
    日期: 2018-04-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/44401/
  • #######################################
    # Exploit Title: Joomla! Component JS Jobs 1.2.0 - Cross Site Scripting
    # Google Dork: N/A
    # Date: 03-04-2018
    #######################################
    # Exploit Author: Sureshbabu Narvaneni#
    #######################################
    # Author Blog : http://nullnews.in
    # Vendor Homepage: https://www.joomsky.com/products/js-jobs.html
    # Software Link: https://www.joomsky.com/5/download/1.html
    # Affected Version: 1.2.0
    # Category: WebApps
    # Tested on: Win7 Enterprise x86/Kali Linux 4.12 i686
    # CVE : CVE-2018-9183
    #
    # 1. Vendor Description:
    #
    # JS Jobs offer to employer to register his company and post jobs. Job
    seeker register him self and add his resume.
    # He can search job and apply on it. Employer will get resume in applied
    resume section.
    #
    # 2. Technical Description:
    #
    # JS Jobs 1.2.0 is missing validation on URL inserted by attacker/employer
    while creating company entry.
    #
    # 3. Proof Of Concept:
    #
    #Create a company entry by logging in as Employer and paste below payload
    in place of URL field.
    #
    #Payload : javascript:alert(1) or
    data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K
    #
    # 4. Solution:
    #
    # Upgrade to latest release.
    # http://www.joomsky.com/5/download/1.html
    #
    # 5. Reference:
    # https://vel.joomla.org/resolved/2146-js-jobs-1-2-0-xss-cross-site-scripting
    # https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9183
    #####################################