Secunia Advisory: SA11894 Print Advisory
Release Date: 2004-06-18
Last Update: 2005-12-05
Impact: Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
Where: From remote
Solution Status: Unpatched
Software: phpMyChat 0.14.x
Some vulnerabilities have been reported in phpMyChat,
which can be exploited by malicious people to bypass
authentication, conduct cross-site scripting and SQL
injection attacks, and disclose some sensitive information.
1) It is reportedly possible to bypass the user
authentication by sending a specially crafted HTTP POST
request to "edituser.php3" where "do_not_login" is set
2) Input passed to the "sheet" and "What" parameters in
"admin.php3" isn't validated, which can be exploited to
read the content of arbitrary files via directory
Successful exploitation requires administrative privileges.
3) Input passed to the "C" parameter in "input.php3",
the "FontName" and "medium" parameters in
"start_page.css.php3" and "style.css.php3", and the
"From" parameter in "users_popupL.php3" is not properly
sanitised before being returned to the user. This can
be exploited to execute arbitrary HTML or script code
in a user's browser session in context of an affected site.
4) Input passed to various parameters in "usersL.php3"
is not sanitised, which can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
5) A security issue where the installation script
"setup.php3" is not correctly removed after
installation, which can be exploited to disclose the
database password and other sensitive information.
The vulnerabilities have been reported in version
0.14.5. Prior versions may also be affected.
Use another product.
Provided and/or discovered by:
Additional information provided by:
Louis Wang, Fortinet Security Research Team, and Megasky.
2004-12-22: Added another vulnerability provided by
sysbug. Updated "Description" section.
2005-05-17: Added additional information provided by
Megasky. Updated "Description" section.
2005-12-05: Added additional information provided by
Louis Wang. Updated "Description" section.