LiveZilla 'g_language' Parameter Cross Site Scripting Vulnerability

Summary
The host is installed with LiveZilla and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a users browser session in the context of an affected site and launch other attacks. Impact Level: Application
Solution
Upgrade to LiveZilla 5.1.1.0 or later, For updates refer to http://livezilla.net
Insight
- The flaw is due to input passed via the 'g_language' GET parameter to '/mobile/php/translation/index.php' is not properly sanitised before being returned to the user. - Input passed via the username and message body to chat.php when starting a new chat session is not properly sanitised before being used.
Affected
LiveZilla version 5.1.0.0
Detection
Send a crafted data via HTTP GET request and check whether it is able read the cookie or not.
References