Vulnerability Description
Cross-site scripting (XSS) vulnerability in assets/js/vm2admin.js in the VirtueMart component before 3.0.8 for Joomla! allows remote attackers to inject arbitrary web script or HTML via vectors involving a "double encode combination of first_name, last_name and company."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Virtuemart | Virtuemart | < 3.0.8 |
Related Weaknesses (CWE)
References
- http://dev.virtuemart.net/projects/virtuemart/repository/diff/trunk/virtuemart/aPatchVendor Advisory
- https://fortiguard.com/zeroday/FG-VD-15-027Third Party Advisory
- https://virtuemart.net/news/470-release-vm3-0-8-2-secured-by-fortinet-s-fortiguaPatchVendor Advisory
- http://dev.virtuemart.net/projects/virtuemart/repository/diff/trunk/virtuemart/aPatchVendor Advisory
- https://fortiguard.com/zeroday/FG-VD-15-027Third Party Advisory
- https://virtuemart.net/news/470-release-vm3-0-8-2-secured-by-fortinet-s-fortiguaPatchVendor Advisory
FAQ
What is CVE-2015-3619?
CVE-2015-3619 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Cross-site scripting (XSS) vulnerability in assets/js/vm2admin.js in the VirtueMart component before 3.0.8 for Joomla! allows remote attackers to inject arbitrary web script or HTML via vectors involv...
How severe is CVE-2015-3619?
CVE-2015-3619 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3619?
Check the references section above for vendor advisories and patch information. Affected products include: Virtuemart Virtuemart.