[PersianHacker.NET 200503-09]PHPOpenChat v3.X XSS Multiple Vulnerability Date: 2005 March Bug Number: 09 PHPOpenChat is a high performance php-based chat server software for a live chat-room or -module on every php-based site. More info @: http://phpopenchat.org/ Discussion: -------------------- The software does not properly validate user-supplied input in 'regulars.php', 'register.php'. A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the PHPOpenChat software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. Exploit: -------------------- PHPOpenChat v3.x XSS Exploit

PHPOpenChat v3.x XSS Exploit

XSS in regulars.php:

exmple: <script>document.write(document.cookie)</script>

XSS in register.php:

Nikname:

Password:

FirstName LastName:

Email:

Url of picture:

exmple: <script>document.write(document.cookie)</script>

 

www.PersianHacker.NET

Solution: -------------------- No solution was available at the time of this entry. Credit: -------------------- Discovered by PersianHacker.NET Security Team by Pi3cH (pi3ch persianhacker net) http://www.PersianHacker.NET Special Thanks: devil_box(for xss article), amectris, herbod. Help -------------------- visit: http://www.PersianHacker.NET or mail me @: pi3ch persianhacker net Note -------------------- This vulnerability reported to authors for solution, from bug report webform.