|
|||
Rule General Information |
---|
Release Date: | 2019-08-22 | |
Rule Name: | Joomla! CMS Gridbox extension Reflected Cross-Site Scripting Vulnerability (CVE-2018-11690) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The Balbooa Gridbox extension version 2.4.0 and previous versions for Joomla! is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. | |
Impact: | An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | http://packetstormsecurity.com/files/148127/Joomla-2.4.0-Gridbox-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2018/Jun/26 http://www.securityfocus.com/archive/1/542066/100/0/threaded https://vel.joomla.org/resolved/2155-gridbox-com-gridbox-multiple-vulnerabilities |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://extensions.joomla.org/extension/gridbox/ |