Zinho has discovered some vulnerabilities in PHPOpenChat, which can be exploited by malicious people to conduct script insertion attacks.
Input passed to the "title", "content", "motto", "subject" and "body" parameters in profile.php, profile_misc.php and mail.php isn't properly sanitised before being used. This can be exploited to inject arbitrary script code which will get executed in a user's browser session in context of an affected site when the malicious input is viewed.
The vulnerabilities have been confirmed in version 3.0.0. and also reported in version 3.0.2.
Solution: Edit the source code to ensure that input is properly sanitised.
Provided and/or discovered by: Zinho, Hackers Center Security Group
Original Advisory: http://www.hackerscenter.com/archive/view.asp?id=4253
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org