Vulnerability Description
In the Kunena extension 5.0.2 through 5.0.4 for Joomla!, the forum message subject (aka topic subject) accepts JavaScript, leading to XSS. Six files are affected: crypsis/layouts/message/item/default.php, crypsis/layouts/message/item/top/default.php, crypsis/layouts/message/item/bottom/default.php, crypsisb3/layouts/message/item/default.php, crypsisb3/layouts/message/item/top/default.php, and crypsisb3/layouts/message/item/bottom/default.php. This is fixed in 5.0.5.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kunena | Kunena | 5.0.2 |
Related Weaknesses (CWE)
References
- http://www.fox.ra.it/technical-articles/kunena-vulnerability-2017-01.htmlExploitThird Party Advisory
- http://www.securityfocus.com/bid/101677
- http://www.fox.ra.it/technical-articles/kunena-vulnerability-2017-01.htmlExploitThird Party Advisory
- http://www.securityfocus.com/bid/101677
FAQ
What is CVE-2017-5673?
CVE-2017-5673 is a vulnerability with a CVSS score of 6.1 (MEDIUM). In the Kunena extension 5.0.2 through 5.0.4 for Joomla!, the forum message subject (aka topic subject) accepts JavaScript, leading to XSS. Six files are affected: crypsis/layouts/message/item/default....
How severe is CVE-2017-5673?
CVE-2017-5673 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5673?
Check the references section above for vendor advisories and patch information. Affected products include: Kunena Kunena.