TUCoPS :: Web :: CMS / Portals :: bu-1607.htm

Joomla - 3D Cloud for Joomla Cross-Site Scripting vulnerability
Cross-Site Scripting vulnerability in 3D Cloud for Joomla
Cross-Site Scripting vulnerability in 3D Cloud for Joomla



Hello Bugtraq!

I want to warn you about Cross-Site Scripting vulnerability in 3D Cloud
(mod_3dcloud) plugin for Joomla. Which I found and disclosed at 22.01.2010.

It is similar to XSS vulnerability in JVClouds3D for Joomla
(http://websecurity.com.ua/3839/). About millions of flash files 
tagcloud.swf which are vulnerable to XSS attacks I mentioned in my article
XSS vulnerabilities in 34 millions flash files
(http://www.webappsec.org/lists/websecurity/archive/2010-01/msg00035.html). 

XSS:

http://site/modules/mod_3dcloud/tagcloud.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='javascript:alert(document.cookie)'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E 

Code will execute after click. It's strictly social XSS.

Also it's possible to conduct HTML Injection attack, including in those 
flash files which have protection (in flash files or via WAF) against 
javascript and vbscript URI in parameter tagcloud.

HTML Injection:

http://site/modules/mod_3dcloud/tagcloud.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='http://websecurity.com.ua'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E 

Vulnerable are 3D Cloud 1.3 and previous versions.

I mentioned about this vulnerability at my site
(http://websecurity.com.ua/3883/). 

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua 


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH