vendor:
phpMyChat Plus
by:
L0n3ly-H34rT
8,8
CVSS
HIGH
Remote Blind SQL Injection, Remote File Inclusion, Local File Inclusion, XSS
89, 94, 98, 79
CWE
Product Name: phpMyChat Plus
Affected Version From: 1.94 RC1
Affected Version To: 1.94 RC1
Patch Exists: YES
Related CWE: N/A
CPE: a:phpmychat:phpmychat_plus
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux/Windows
2012
phpMyChat Plus v1.94 RC1 Multiple Remote Vulnerabilities
The phpMyChat Plus v1.94 RC1 is vulnerable to Remote Blind SQL Injection, Remote File Inclusion, Local File Inclusion, and XSS. For Remote Blind SQL Injection, an attacker can use some automatic blind SQL injection to get database information. For Remote File Inclusion, the allow_url_include must be set to On. For Local File Inclusion, the magic_quotes_gpc must be set to Off. For XSS, an attacker must have a good brain.
Mitigation:
To mitigate Remote Blind SQL Injection, Remote File Inclusion, Local File Inclusion, and XSS, the user should ensure that the allow_url_include is set to Off, the magic_quotes_gpc is set to On, and that all user input is properly sanitized.