lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAESCr8MkO6uXFoKCaSsT+WTduPu-L49vpDYd5=ckXYXkxGxV+w@mail.gmail.com> Date: Tue, 2 Oct 2012 18:08:23 +0300 From: Netsparker Advisories <advisories@...itunasecurity.com> To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk Subject: XSS Vulnerabilities in phpFreeChat Information -------------------- Name : XSS Vulnerabilities in phpFreeChat Software : phpFreeChat 1.4 and possibly below. Vendor Homepage : http://www.phpfreechat.net Vulnerability Type : Cross-Site Scripting Severity : Critical Researcher : Mesut Timur Advisory Reference : NS-12-010 Description -------------------- phpFreeChat is a free, simple to install, fast, customizable and multi languages chat that uses a simple filesystem for message and nickname storage. Details -------------------- phpFreeChat is affected by XSS vulnerabilities in version 1.4. Example PoC urls are as follows : http://example.com/demo/demo21_with_hardcoded_urls.php?'"--></style></script><script>alert(0x000A26)</script> http://example.com/demo/demo2_simple_with_params.php?'"--></style></script><script>alert(0x000855)</script> You can read the full article about Cross-Site Scripting vulnerabilities from here : Cross-site Scripting Solution -------------------- The vendor fixed this vulnerability in the new version. Please see the references. Advisory Timeline -------------------- 29/06/2012 - First contact: No reply 14/08/2012 - Second contact: Sent the vulnerability details 24/09/2012 - Ask for patch/fix: No reply 02/10/2012 - Vulnerability Released Credits -------------------- It has been discovered on testing of Netsparker, Web Application Security Scanner - http://www.mavitunasecurity.com/netsparker/. References -------------------- Vendor Url / Patch : - MSL Advisory Link : http://www.mavitunasecurity.com/xss-vulnerabilities-in-phpfreechat/ Netsparker Advisories : http://www.mavitunasecurity.com/netsparker-advisories/ About Netsparker -------------------- Netsparker® can find and report security issues such as SQL Injection and Cross-site Scripting (XSS) in all web applications regardless of the platform and the technology they are built on. Netsparker's unique detection and exploitation techniques allows it to be dead accurate in reporting hence it's the first and the only False Positive Free web application security scanner. -- Netsparker Advisories, <advisories@...itunasecurity.com> Homepage, http://www.mavitunasecurity.com/netsparker-advisories/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists