Lucene search

HistoryMay 04, 2014 - 12:00 a.m.

Multiple vulnerabilities in Joomla-Base


Hello 3APA3A!

These are Denial of Service, XML Injection, Cross-Site Scripting, Full path disclosure and Insufficient Anti-automation vulnerabilities in Joomla-Base. This is package of Joomla with different plugins (with their vulnerabilities).

These vulnerabilities are in Google Maps plugin for Joomla, which is used in this package. In 2013-2014 I wrote advisories about multiple vulnerabilities in Google Maps plugin (, and

Affected products:

Vulnerable are all versions of Joomla-Base, which includes this plugin.

After my informing, the developer removed this plugin from his package (

Affected vendors:

Pablo Arias


Denial of Service (WASC-10):


Besides conducting DoS attack manually, it's also possible to conduct automated DoS and DDoS attacks with using of DAVOSET (

XML Injection (WASC-23):


It's possible to include external xml-files. Which also can be used for XSS attack:

XSS via XML Injection (WASC-23):


File xss.xml:

<?xml version="1.0" encoding="utf-8"?>
<div xmlns=";&gt;&lt;script&gt;alert&#40;document.cookie&#41;&lt;/script&gt;&lt;/div&gt;

Cross-Site Scripting (WASC-08):


Full path disclosure (WASC-13):


This is possible with corresponding PHP settings, when warnings are shown.

Insufficient Anti-automation (WASC-21):

In this functionality there is no reliable protection from automated requests.

Also in my third advisory concerning Google Maps plugin, I wrote about security bypass for built-in domain restriction functionality and described method of bypass protection against automated requests introduced in version 3.2. So even the latest version is vulnerable to IAA.

Best wishes & regards,
Eugene Dokukin aka MustLive
Administrator of Websecurity web site