Joomla! Googlemaps Plugin Multiple Remote Security Vulnerabilities

An attacker can exploit these issues using a web browser. To exploit the cross-site scripting issue an attacker must entice an unsuspecting user to follow a malicious URI.

The following example URI is available:

http://www.example.com/plugins/content/plugin_googlemap2_proxy.php?url=%3Cbody%20onload=alert(document.cookie)%3E


 

Privacy Statement
Copyright 2010, SecurityFocus