Multiple Cross-site Scripting Vulnerabilities in phpFreeChat
Information
Advisory by Netsparker (now Invicti)
Name: XSS Vulnerabilities in phpFreeChat
Software: phpFreeChat 1.4 and possibly below.
Vendor Homepage: http://www.phpfreechat.net
Vulnerability Type: Cross-Site Scripting
Severity: Critical
Researcher: Mesut Timur
Advisory Reference: NS-12-010
Description
phpFreeChat is a free, simple to install, fast, customizable and multi languages chat that uses a simple filesystem for message and nickname storage.
Details
phpFreeChat is affected by XSS vulnerabilities in version 1.4.
Example PoC urls are as follows:
http://example.com/demo/demo21_with_hardcoded_urls.php?'"--></style></script><script>alert(0x000A26)</script>
http://example.com/demo/demo2_simple_with_params.php?'"--></style></script><script>alert(0x000855)</script>
Learn more about Cross-Site Scripting vulnerabilities:
Solution
The vendor fixed this vulnerability in the new version. Please see the references.
Advisory Timeline
29/06/2012 – First contact: No reply
14/08/2012 – Second contact: Sent the vulnerability details
24/09/2012 – Ask for patch/fix: No reply
02/10/2012 – Vulnerability Released
Credits
It has been discovered on testing of Invicti.
References
- Vendor URL / Patch: –
- MSL Advisory Link: /web-applications-advisories/xss-vulnerabilities-in-phpfreechat/
- Invicti Advisories: /web-applications-advisories/
About Invicti
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.