Mambo task Parameter XSS

medium Nessus Plugin ID 55511

Synopsis

The remote web server hosts a PHP script that is susceptible to a cross-site scripting attack.

Description

The version of Mambo installed on the remote host does not sanitize input to the 'task' parameter of 'index.php' when 'option' is set to 'com_content' before using it to generate dynamic HTML.

An attacker could leverage this issue to inject arbitrary HTML or script code into a user's browser to be executed within the security context of the affected site.

Note that this install is likely to be affected by several similar issues affecting its administrative pages, although Nessus has not checked for them.

Solution

Apply the patch referenced in Mambo Tracker issue #479.

See Also

http://www.nessus.org/u?f09fc11a

https://seclists.org/fulldisclosure/2011/Jun/512

http://www.nessus.org/u?e61cee3a

http://forum.mambo-foundation.org/showthread.php?t=18481

Plugin Details

Severity: Medium

ID: 55511

File Name: mambo_task_xss.nasl

Version: 1.12

Type: remote

Published: 7/5/2011

Updated: 6/1/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Vulnerability Information

Required KB Items: www/PHP, www/mambo_mos

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Patch Publication Date: 10/29/2010

Vulnerability Publication Date: 10/28/2010

Reference Information

BID: 48455

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990