vendor:
123 Flashchat
by:
Lincoln
7,5
CVSS
HIGH
Multiple Remote Vulnerabilities
79, 79, 312
CWE
Product Name: 123 Flashchat
Affected Version From: 7.8
Affected Version To: 7.8
Patch Exists: YES
Related CWE: N/A
CPE: a:123flashchat:123_flashchat
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2010
123 Flashchat version 7.8 Remote
123 Flashchat version 7.8 is vulnerable to Directory Traversal, XSS and Password sent via clear text. Directory Traversal can be exploited by sending a specially crafted HTTP request containing directory traversal sequences (e.g. “/../../../../../../boot.ini”) to the vulnerable server. XSS can be exploited by sending a specially crafted HTTP request containing malicious JavaScript code (e.g. “<script>alert(“Corelan”)</script>”) to the vulnerable server. Password sent via clear text can be exploited by sending a specially crafted HTTP request containing the user’s credentials (e.g. “username=admin&password=admin”) to the vulnerable server.
Mitigation:
Upgrade to the latest version of 123 Flashchat, apply the latest security patches, and configure the application and system securely.