Summary
This host is installed with FlashChat and is prone to Security Bypass Vulnerability.
Impact
Successful exploitation will let the attacker bypass certain security restrictions and gain unauthorized administrative access to the affected application.
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
This flaw is due to an error in the connection.php script.
By setting the 's' parameter to a value of '7' a remote attacker could bypass the role filtering mechanism.
Affected
FlashChat Version 5.0.8 and prior
References
Severity
Classification
-
CVE CVE-2008-6799 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AdPeeps 'index.php' Multiple Vulnerabilities.
- 3Com OfficeConnect VPN Firewall Default Password Security Bypass Vulnerability
- ArticleSetup Multiple Cross-Site Scripting and SQL Injection Vulnerabilities
- Atlassian JIRA Privilege Escalation and Multiple Cross Site Scripting Vulnerabilities
- Apple Safari RSS Feed Information Disclosure Vulnerability