vendor:
ARSC Really Simple Chat
by:
Zer0 Thunder
7,5
CVSS
HIGH
Remote File Inclusion & Cross Site Scripting
94, 79
CWE
Product Name: ARSC Really Simple Chat
Affected Version From: V3.3
Affected Version To: V3.3
Patch Exists: NO
Related CWE: N/A
CPE: a:arsc:arsc_really_simple_chat:3.3
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
ARSC Really Simple Chat V3.3 Remote File Inclsion & Cross Site Scripting Vulnerability
A Remote File Inclusion (RFI) vulnerability exists in ARSC Really Simple Chat V3.3. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to execute arbitrary code on the vulnerable system. A Cross Site Scripting (XSS) vulnerability also exists in ARSC Really Simple Chat V3.3. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to execute arbitrary code on the vulnerable system.
Mitigation:
To mitigate the risk of RFI and XSS attacks, input validation should be performed on all user-supplied data. Additionally, the application should be configured to use a secure transport layer such as TLS/SSL.