Short Name |
HTTP:PHP:JOOMLA-XCLONER |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Joomla XCloner Code Injection |
Release Date |
2011/05/16 |
Update Number |
1920 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Joomla XCloner. A successful attack can lead to arbitrary code execution.
Joomla XCloner component is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. These vulnerabilities include multiple cross-site scripting vulnerabilities, multiple local file-include vulnerabilities and multiple security-bypass vulnerabilities. An attacker can exploit these vulnerabilities to view and execute local files within the context of the webserver process, obtain potentially sensitive information, execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, or bypass certain security restrictions to perform unauthorized actions. Other attacks are also possible.