Description
|
|
Secunia Research has discovered two vulnerabilities in the JCE component for Joomla!, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.
1) Input passed to the "search" parameter in administrator/index.php (when "option" is set to "com_jce" and "view" is set to "users") is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) An error due to the components/com_jce/editor/extensions/browser/file.php script not properly verifying requests to rename files can be exploited to rename e.g. core Joomla! configuration files, resulting in the application becoming unavailable.
Successful exploitation of this vulnerability requires "Author" privileges.
The vulnerabilities are confirmed in version 2.1.0. Other versions may also be affected.
|