vendor:
MS Comment Component for Joomla!
by:
SecurityFocus
7.5
CVSS
HIGH
Security Bypass
264
CWE
Product Name: MS Comment Component for Joomla!
Affected Version From: 0.8.0b
Affected Version To: 0.8.0b
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
MS Comment Component for Joomla! Security Bypass Vulnerabilities
The MS Comment component for Joomla! is prone to a security-bypass vulnerability because it fails to properly sanitize user-supplied input. The component is also prone to a security-bypass vulnerability because it fails to reset the CAPTCHA after a submission. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Mitigation:
Ensure that user-supplied input is properly sanitized and that the CAPTCHA is reset after a submission.