Search
Other Advanced Module Manager questions
Forum

Stored XSS - com_admintools

Roger Bilinda's Avatar Roger Bilinda
The application's sendInfo embeds untrusted data in the generated output with curl_exec, at
line 66 of com_admintools/src/Helper/usagestats.php. This untrusted data is embedded straight
into the output without proper sanitization or encoding, enabling an attacker to inject malicious
code into the output.
The attacker would be able to alter the returned web page by saving malicious data in a datastore ahead of time. The attacker's modified data is then read from the database by the
sendInfo method with curl_init, at line 66 of com_admintools/src/Helper/usagestats.php. This
untrusted data then flows through the code straight to the output web page, without
sanitization.
This can enable a Stored Cross-Site Scripting (XSS) attack.
Source Destination
File com_admintools/src/Helper/usagestats.p
hp
com_admintools/src/Helper/usagestats.p
hp
Line 92 96
Object curl_init curl_exec
Code Snippet
File Name com_admintools/src/Helper/usagestats.php
Method public function sendInfo($useIframe = false)

....
92. $ch = curl_init($url);
....
96. return curl_exec($ch);
Peter van Westen's Avatar Peter van Westen ADMIN
Why are you posting this here?
I have nothing to do with Admin Tools.
Please post a rating at the Joomla! Extensions Directory
You can only post on the extension support forum if you have an active subscription and you log in

Buy a Pro subscription