Access Control: Joomla JVTwitter - Cross-Site Scripting¶
Identifier:
joomla_jvtwitter_xss
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials.
Reference:
- https://buaq.net/go-44433.html
- https://cxsecurity.com/issue/WLB-2020110041
- https://extensions.joomla.org/
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.