HTTP: Joomla XCloner Code Injection

This signature detects attempts to exploit a known vulnerability against Joomla XCloner. A successful attack can lead to arbitrary code execution.

Extended Description

Joomla XCloner component is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. These vulnerabilities include multiple cross-site scripting vulnerabilities, multiple local file-include vulnerabilities and multiple security-bypass vulnerabilities. An attacker can exploit these vulnerabilities to view and execute local files within the context of the webserver process, obtain potentially sensitive information, execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, or bypass certain security restrictions to perform unauthorized actions. Other attacks are also possible.

Affected Products

Xcloner xcloner

References

BugTraq: 46582

URL: http://www.xcloner.com/

Short Name
HTTP:PHP:JOOMLA-XCLONER
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Code Injection Joomla XCloner bid:46582
Release Date
05/16/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Xcloner

Found a potential security threat?