Vulnerability Description
The Googlemaps plugin before 3.1 for Joomla! allows remote attackers to conduct XML injection attacks via the url parameter to plugin_googlemap2_proxy.php.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mapsplugin | Googlemaps | <= 3.0 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2013/Jul/158ExploitMailing ListThird Party Advisory
- http://www.mapsplugin.com/Google-Maps/Documentation-of-plugin-Googlemap/securityPatchURL Repurposed
- http://www.openwall.com/lists/oss-security/2015/02/26/11Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/02/26/4Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2013/Jul/158ExploitMailing ListThird Party Advisory
- http://www.mapsplugin.com/Google-Maps/Documentation-of-plugin-Googlemap/securityPatchURL Repurposed
- http://www.openwall.com/lists/oss-security/2015/02/26/11Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/02/26/4Mailing ListThird Party Advisory
FAQ
What is CVE-2013-7429?
CVE-2013-7429 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Googlemaps plugin before 3.1 for Joomla! allows remote attackers to conduct XML injection attacks via the url parameter to plugin_googlemap2_proxy.php.
How severe is CVE-2013-7429?
CVE-2013-7429 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2013-7429?
Check the references section above for vendor advisories and patch information. Affected products include: Mapsplugin Googlemaps.