vendor:
JSN PowerAdmin Joomla! Extension
by:
RatioSec Research
7,5
CVSS
HIGH
Cross-site request forgery and reflected cross-site scripting
352, 79
CWE
Product Name: JSN PowerAdmin Joomla! Extension
Affected Version From: 2.3.0
Affected Version To: Prior versions may also be affected
Patch Exists: NO
Related CWE: Pending
CPE: a:joomlashine.com:jsn_poweradmin
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2016
JSN PowerAdmin Joomla! Extension Remote Command Execution Via CSRF and XSS vulnerabilities
RatioSec Research has discovered two cross-site request forgery and reflected cross-site scripting vulnerabilities in JSN PowerAdmin Joomla! Extension which can be exploited, respectively, to upload PHP files and run arbitrary HTML and script code in a user's browser session in context of the affected web site.
Mitigation:
Perform proper checks to verify the requests validity and sanitise input before being reflected.