Vulnerability Description
An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in an XSS vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Joomla | Joomla\! | < 3.8.8 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104269Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040966Third Party AdvisoryVDB Entry
- https://developer.joomla.org/security-centre/736-20180508-core-possible-xss-attaVendor Advisory
- http://www.securityfocus.com/bid/104269Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040966Third Party AdvisoryVDB Entry
- https://developer.joomla.org/security-centre/736-20180508-core-possible-xss-attaVendor Advisory
FAQ
What is CVE-2018-11328?
CVE-2018-11328 is a vulnerability with a CVSS score of 4.7 (MEDIUM). An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of...
How severe is CVE-2018-11328?
CVE-2018-11328 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11328?
Check the references section above for vendor advisories and patch information. Affected products include: Joomla Joomla\!.