Joomla! Core CVE-2018-6378 Cross Site Scripting Vulnerabilitiy
BID:104268
CVE-2018-6378 |Info
Joomla! Core CVE-2018-6378 Cross Site Scripting Vulnerabilitiy
| Bugtraq ID: | 104268 |
| Class: | Input Validation Error |
| CVE: |
CVE-2018-6378 |
| Remote: | Yes |
| Local: | No |
| Published: | May 22 2018 12:00AM |
| Updated: | May 22 2018 12:00AM |
| Credit: | David Jardin, JSST |
| Vulnerable: |
Joomla Joomla! 3.8.7 Joomla Joomla! 3.8.6 Joomla Joomla! 3.8.5 Joomla Joomla! 3.8.4 Joomla Joomla! 3.8.3 Joomla Joomla! 3.8.2 Joomla Joomla! 3.8.1 Joomla Joomla! 3.7.3 Joomla Joomla! 3.7.2 Joomla Joomla! 3.7.1 Joomla Joomla! 3.7 Joomla Joomla! 3.6.5 Joomla Joomla! 3.4.7 Joomla Joomla! 3.4.6 Joomla Joomla! 3.4.4 Joomla Joomla! 3.4.3 Joomla Joomla! 3.4.2 Joomla Joomla! 3.4.1 Joomla Joomla! 3.4 Joomla Joomla! 3.3.6 Joomla Joomla! 3.3.5 Joomla Joomla! 3.3.4 Joomla Joomla! 3.3.3 Joomla Joomla! 3.3.2 Joomla Joomla! 3.3.1 Joomla Joomla! 3.3 Joomla Joomla! 3.2.6 Joomla Joomla! 3.2.5 Joomla Joomla! 3.2.4 Joomla Joomla! 3.2.3 Joomla Joomla! 3.2.2 Joomla Joomla! 3.2.1 Joomla Joomla! 3.1.6 Joomla Joomla! 3.1.5 Joomla Joomla! 3.1.4 Joomla Joomla! 3.1.1 Joomla Joomla! 3.1 Joomla Joomla! 3.0.4 Joomla Joomla! 3.0.3 Joomla Joomla! 3.0.1 Joomla Joomla! 3.0 Joomla Joomla! 2.5.26 Joomla Joomla! 2.5.25 Joomla Joomla! 2.5.24 Joomla Joomla! 2.5.19 Joomla Joomla! 2.5.18 Joomla Joomla! 2.5.17 Joomla Joomla! 2.5.16 Joomla Joomla! 2.5.15 Joomla Joomla! 2.5.14 Joomla Joomla! 2.5.13 Joomla Joomla! 2.5.11 Joomla Joomla! 2.5.10 Joomla Joomla! 2.5.9 Joomla Joomla! 2.5.8 Joomla Joomla! 2.5.7 Joomla Joomla! 2.5.6 Joomla Joomla! 2.5.5 Joomla Joomla! 2.5.4 Joomla Joomla! 2.5.3 Joomla Joomla! 2.5.2 Joomla Joomla! 2.5.1 Joomla Joomla! 2.5 Joomla Joomla! 1.7.5 Joomla Joomla! 1.7.4 Joomla Joomla! 1.7.3 Joomla Joomla! 1.7.2 Joomla Joomla! 1.7.1 Joomla Joomla! 1.7 Joomla Joomla! 1.6.6 Joomla Joomla! 1.6.4 Joomla Joomla! 1.6.3 Joomla Joomla! 1.6.2 Joomla Joomla! 1.6.1 Joomla Joomla! 1.6 Joomla Joomla! 1.5.26 Joomla Joomla! 1.5.22 Joomla Joomla! 1.5.21 Joomla Joomla! 1.5.20 Joomla Joomla! 1.5.19 Joomla Joomla! 1.5.18 Joomla Joomla! 1.5.17 Joomla Joomla! 1.5.16 Joomla Joomla! 1.5.15 Joomla Joomla! 1.5.14 Joomla Joomla! 1.5.13 Joomla Joomla! 1.5.12 Joomla Joomla! 1.5.11 Joomla Joomla! 1.5.10 Joomla Joomla! 1.5.9 Joomla Joomla! 1.5.8 Joomla Joomla! 1.5.7 Joomla Joomla! 1.5.6 Joomla Joomla! 1.5.5 Joomla Joomla! 1.5.4 Joomla Joomla! 1.5.2 Joomla Joomla! 3.8.0 Joomla Joomla! 3.7.5 Joomla Joomla! 3.7.4 Joomla Joomla! 3.6.4 Joomla Joomla! 3.6.3 Joomla Joomla! 3.6.1 Joomla Joomla! 3.6.0 Joomla Joomla! 3.4.5 Joomla Joomla! 3.2 Joomla Joomla! 2.5 Joomla Joomla! 1.5.23 Joomla Joomla! 1.5.1 Joomla Joomla! 1.5.0 |
| Not Vulnerable: |
Joomla Joomla! 3.8.8 |
Discussion
Joomla! Core CVE-2018-6378 Cross Site Scripting Vulnerabilitiy
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! version 1.5.0 through 3.8.7 are vulnerable.
Joomla! Core is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Joomla! version 1.5.0 through 3.8.7 are vulnerable.
Exploit / POC
Joomla! Core CVE-2018-6378 Cross Site Scripting Vulnerabilitiy
An attacker can exploit this issue by enticing an unsuspecting user to visit a specially crafted URL.
An attacker can exploit this issue by enticing an unsuspecting user to visit a specially crafted URL.
Solution / Fix
Joomla! Core CVE-2018-6378 Cross Site Scripting Vulnerabilitiy
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.