Joomla! JS Calendar Component SQL Injection and Multiple Cross Site Scripting Vulnerabilities

An attacker can exploit these issues via a browser. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.

The following example URIs are available:
http://www.example.com/path/index.php?option=com_jscalendar&view=jscalendar&task=details&ev_id=[SQLi]

http://www.example.com/path/index.php?option=com_jscalendar&view=jscalendar&month=[XSS]
http://www.example.com/path/index.php?option=com_jscalendar&view=jscalendar&year=[XSS]


 

Privacy Statement
Copyright 2010, SecurityFocus