vendor:
Komento Joomla Extension
by:
High-Tech Bridge Security Research Lab
4,3
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: Komento Joomla Extension
Affected Version From: 1.7.2
Affected Version To: 1.7.2
Patch Exists: YES
Related CWE: CVE-2014-0793
CPE: a:stackideas:komento
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2014
Cross-Site Scripting (XSS) in Komento Joomla Extension
The vulnerability exists due to insufficient sanitisation of user-supplied data passed via the 'website' HTTP POST parameter to '/?option=com_komento' URL. A remote attacker can submit a comment with specially crafted 'Website' field and execute arbitrary HTML and script code in browser in context of the vulnerable website when a user clicks on the nickname of the malicious author.
Mitigation:
Fixed by Vendor