Joomla! < 1.5.11 JA_Purity Template Multiple XSS

medium Nessus Plugin ID 39331

Synopsis

The remote web server contains a PHP application that is affected by multiple cross-site scripting vulnerabilities.

Description

The version of Joomla! running on the remote host is prior to 1.5.11.
It is, therefore, affected by multiple, persistent cross-site scripting (XSS) vulnerabilities in the JA_Purity template. An unauthenticated, remote attacker can exploit these, by convincing a user to follow a specially crafted URL, to inject arbitrary HTML and script code into the user's cookie, making the attack persistent for the entire browser session.

Note that this version of Joomla! may be affected by additional cross-site scripting vulnerabilities; however, Nessus has not checked for these.

Solution

Upgrade to Joomla! version 1.5.11 or later.

See Also

https://seclists.org/bugtraq/2009/Jun/64

http://www.nessus.org/u?61ee0689

http://www.nessus.org/u?e94ed320

Plugin Details

Severity: Medium

ID: 39331

File Name: joomla_ja_purity_xss.nasl

Version: 1.25

Type: remote

Published: 6/9/2009

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Low

Score: 2.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:joomla:joomla%5c%21

Required KB Items: www/PHP, installed_sw/Joomla!

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 6/3/2009

Vulnerability Publication Date: 6/5/2009

Reference Information

CVE: CVE-2009-1939

BID: 35189

CWE: 79

SECUNIA: 35278