Access Control: Joomla JLex Review 6.0.1 - Cross-Site Scripting¶
Identifier:
joomla_jlex_xss
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner |
|---|---|---|
Description¶
The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials.
Reference:
- https://www.exploitalert.com/view-details.html?id=39732
- https://www.exploit-db.com/exploits/51645
- https://extensions.joomla.org/extension/jlex-review/
Configuration¶
Example¶
Example configuration:
Reference¶
assets_allowed¶
Type : List[AssetType]*
List of assets that this check will cover.
skip¶
Type : boolean
Skip the test if true.