vendor:
ArrowChat
by:
Kallimero
7,5
CVSS
HIGH
Local File Inclusion & Reflected XSS
98, 79
CWE
Product Name: ArrowChat
Affected Version From: 1.5.61
Affected Version To: 1.6
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian
2013
ArrowChat <=~ 1.5.61 Multiple vulnerabilities
ArrowChat is a chat script, which is able to be integrate in various CMS, as wordpress, or some bulletin boards. The vulnerability is due to the lack of secure validation of the 'lang' parameter in the external.php file, which allows an attacker to include arbitrary files on the server. Additionally, the reflected XSS vulnerability is due to the lack of secure validation of the 'PHP_SELF' parameter in the admin/layout/pages_general.php file, which allows an attacker to inject arbitrary HTML and script code.
Mitigation:
To fix the LFI, replace the code in external.php with the code provided in the text. To fix the XSS, replace the code in admin/layout/pages_general.php with the code provided in the text.