Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:PHP:JOOMLA-XCLONER

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

joomla xcloner code execution

Release Date

2011/05/16

Update Number

1920

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Joomla XCloner Code Injection


This signature detects attempts to exploit a known vulnerability against Joomla XCloner. A successful attack can lead to arbitrary code execution.

Extended Description

Joomla XCloner component is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. These vulnerabilities include multiple cross-site scripting vulnerabilities, multiple local file-include vulnerabilities and multiple security-bypass vulnerabilities. An attacker can exploit these vulnerabilities to view and execute local files within the context of the webserver process, obtain potentially sensitive information, execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, or bypass certain security restrictions to perform unauthorized actions. Other attacks are also possible.

Affected Products

  • XCloner

References

  • BugTraq: 46582
  • URL: http://www.xcloner.com/

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out