Lucene search

K
EnghouseWeb Chat

5 matches found

CVE
CVE
added 2020/09/03 3:15 p.m.35 views

CVE-2020-13972

Enghouse Web Chat 6.2.284.34 allows XSS. When one enters their own domain name in the WebServiceLocation parameter, the response from the POST request is displayed, and any JavaScript returned from the external server is executed in the browser. This is related to CVE-2019-16951.

6.1CVSS5.3AI score0.00356EPSS
CVE
CVE
added 2019/11/13 6:15 p.m.32 views

CVE-2019-16949

An issue was discovered in Enghouse Web Chat 6.1.300.31 and 6.2.284.34. A user is allowed to send an archive of their chat log to an email address specified at the beginning of the chat (where the user enters in their name and e-mail address). This POST request can be modified to change the message...

6.5CVSS6.3AI score0.00296EPSS
CVE
CVE
added 2019/11/13 5:15 p.m.30 views

CVE-2019-16948

An SSRF issue was discovered in Enghouse Web Chat 6.1.300.31. In any POST request, one can replace the port number at WebServiceLocation=http://localhost:8085/UCWebServices/ with a range of ports to determine what is visible on the internal network (as opposed to what general web traffic would see ...

9.8CVSS9.2AI score0.00364EPSS
CVE
CVE
added 2019/11/13 7:15 p.m.28 views

CVE-2019-16950

An XSS issue was discovered in Enghouse Web Chat 6.1.300.31 and 6.2.284.34. The QueueName parameter of a GET request allows for insertion of user-supplied JavaScript.

6.1CVSS6AI score0.00328EPSS
CVE
CVE
added 2019/11/13 7:15 p.m.28 views

CVE-2019-16951

A remote file include (RFI) issue was discovered in Enghouse Web Chat 6.2.284.34. One can replace the localhost attribute with one's own domain name. When the product calls this domain after the POST request is sent, it retrieves an attacker's data and displays it. Also worth mentioning is the amou...

5.3CVSS5.6AI score0.00356EPSS