phpMyChat input.php3 C Variable XSS

2004-04-22T00:00:00
ID OSVDB:7151
Type osvdb
Reporter HEX(hex@hex.net.ru)
Modified 2004-04-22T00:00:00

Description

Vulnerability Description

phpMyChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'C' variables upon submission to the 'input.php3' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

phpMyChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'C' variables upon submission to the 'input.php3' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

<INPUT TYPE="TEXT" NAME="C" VALUE="#FF0000\">[CODE]"> <INPUT TYPE="TEXT" NAME="C" VALUE="#FF0000\"><script>alert(document.cookie)</script><a \"">

References:

Vendor URL: http://www.phpheaven.net/rubrique4.html Security Tracker: 1010515 Secunia Advisory ID:11894 Related OSVDB ID: 7152 Related OSVDB ID: 7149 Related OSVDB ID: 7150 Mail List Post: http://seclists.org/lists/bugtraq/2004/Jun/0261.html