Summary
This host is installed with Joomla! friechat component and is prone to multiple cross site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a users browser session in the context of an affected site and launch other attacks.
Impact Level: Application
Solution
No solution or patch is available as of 9th February, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://codologic.com
Insight
Multiple flaws are due to insufficient validation of 'id' and 'xhash' HTTP GET parameters passed to '/client/chat.php' script and 'toname' POST parameter passed to '/client/plugins/upload/upload.php' script.
Affected
Joomla Component FreiChat version 9.6 and prior.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2013-5952 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities