PHPOpenChat userpage.php profile Field XSS

2005-08-05T06:54:59
ID OSVDB:18676
Type osvdb
Reporter Zinho(zinho@hackerscenter.com)
Modified 2005-08-05T06:54:59

Description

Vulnerability Description

PHPOpenChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input to the 'profile' field upon submission to the 'userpage.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PHPOpenChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input to the 'profile' field upon submission to the 'userpage.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://phpopenchat.org/ Security Tracker: 1014634 Secunia Advisory ID:16350 Related OSVDB ID: 18674 Related OSVDB ID: 18675 Related OSVDB ID: 18677 Related OSVDB ID: 18678 Other Advisory URL: http://www.hackerscenter.com/archive/view.asp?id=4253 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-08/0081.html ISS X-Force ID: 21761 CVE-2005-2545 Bugtraq ID: 14484