Summary
The host is installed with LiveZilla and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a users browser session in the context of an affected site and launch other attacks.
Impact Level: Application
Solution
Upgrade to LiveZilla 5.1.1.0 or later,
For updates refer to http://livezilla.net
Insight
- The flaw is due to input passed via the 'g_language' GET parameter to '/mobile/php/translation/index.php' is not properly sanitised before being returned to the user.
- Input passed via the username and message body to chat.php when starting a new chat session is not properly sanitised before being used.
Affected
LiveZilla version 5.1.0.0
Detection
Send a crafted data via HTTP GET request and check whether it is able read the cookie or not.
References
Severity
Classification
-
CVE CVE-2013-6224, CVE-2013-7002 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities