header-logo
Suggest Exploit
vendor:
JSupport
by:
Valentin Hoebel
7,5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: JSupport
Affected Version From: 1.5.6
Affected Version To: 1.5.6
Patch Exists: NO
Related CWE: N/A
CPE: a:extension_depot:jsupport
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Joomla Component com_jsupport Critical XSS Vulnerability

The component allows you to create and submit tickets. The tickets can be viewed on the website and in the admin panel. It is possible to inject arbitrary HTML and JS/VBS code into the title field of the ticket. If someone else views the ticket list, the code gets executed in the visitor's browser. This vulnerability is considered as critical since the tickets are also displayed in the administrator backend of Joomla. As soon as a user with extended priviledges views the ticket list in the admin backend, the code gets executed and damage can be caused.

Mitigation:

Input validation should be used to prevent malicious code from being injected into the ticket title field.
Source

Exploit-DB raw data:

# Exploit Title: Joomla Component com_jsupport Critical XSS Vulnerability
# Date: 12.11.2010
# Author: Valentin
# Category: webapps/0day
# Version: 1.5.6
# Tested on:
# CVE :  
# Code : 

[:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::]
>> General Information 
Advisory/Exploit Title = Joomla Component com_jsupport Critical XSS Vulnerability
Author = Valentin Hoebel
Contact = valentin@xenuser.org

[:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::]
>> Product information
Name = JSupport
Vendor = Extension Depot
Vendor Website = http://www.extensiondepot.com/extensions/jsupport.html
Affected Version(s) = 1.5.6
 
[:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::]
>> Critical XSS Vulnerability
The component allows you to create and submit tickets. The tickets can be viewed
on the website and in the admin panel.

It is possible to inject arbitrary HTML and JS/VBS code into the title field of the
ticket. If someone else views the ticket list, the code gets executed in the
visitor's browser.

This vulnerability is considered as critical since the tickets are also displayed
in the administrator backend of Joomla. As soon as a user with extended priviledges
views the ticket list in the backend, the code gets executed and damage can be caused.

Example code for the ticket title field:
"><IMG """><SCRIPT>alert("XSS")</SCRIPT>

[:::::::::::::::::::::::::::::::::::::: 0x4 ::::::::::::::::::::::::::::::::::::::]
>> Additional Information
Advisory/Exploit Published = 12.11.2010

[:::::::::::::::::::::::::::::::::::::: 0x5 ::::::::::::::::::::::::::::::::::::::]
>> Misc
Greetz = cr4wl3r, JosS, packetstormsecurity.org, exploit-db.com

[:::::::::::::::::::::::::::::::::::::: EOF ::::::::::::::::::::::::::::::::::::::]