CVE-2023-54361
Description
Joomla iProperty Real Estate 4.1.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the filter_keyword parameter. Attackers can craft URLs containing JavaScript payloads in the filter_keyword GET parameter of the all-properties-with-map endpoint to execute arbitrary code in victim browsers and steal session tokens or credentials.
CWE
- CWE-79 — Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Affected
- Thethinkery / Joomla iProperty Real Estate — v=4.1.1 [affected]
CVSS
- 4.0 score=5.1 severity=MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N - 3.1 score=6.1 severity=MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
References
- https://www.exploit-db.com/exploits/51640 exploit
- http://thethinkery.net product
- https://extensions.joomla.org/extension/vertical-markets/real-estate/iproperty/ product
- https://www.vulncheck.com/advisories/joomla-iproperty-real-estate-reflected-xss-via-filter-keyword third-party-advisory
Source
cvelistV5-main/cves/2023/54xxx/CVE-2023-54361.json