#74 phpMyChat Multiple Vulnerabilities

0.14
open
nobody
None
5
2012-09-14
2005-12-06
Steven Roddis
No

http://secunia.com/advisories/11894/

Secunia Advisory: SA11894 Print Advisory
Release Date: 2004-06-18
Last Update: 2005-12-05

Critical:
Moderately critical
Impact: Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
Where: From remote
Solution Status: Unpatched

Software: phpMyChat 0.14.x

Description:
Some vulnerabilities have been reported in phpMyChat,
which can be exploited by malicious people to bypass
authentication, conduct cross-site scripting and SQL
injection attacks, and disclose some sensitive information.

1) It is reportedly possible to bypass the user
authentication by sending a specially crafted HTTP POST
request to "edituser.php3" where "do_not_login" is set
to "false".

2) Input passed to the "sheet" and "What" parameters in
"admin.php3" isn't validated, which can be exploited to
read the content of arbitrary files via directory
traversal attacks.

Successful exploitation requires administrative privileges.

3) Input passed to the "C" parameter in "input.php3",
the "FontName" and "medium" parameters in
"start_page.css.php3" and "style.css.php3", and the
"From" parameter in "users_popupL.php3" is not properly
sanitised before being returned to the user. This can
be exploited to execute arbitrary HTML or script code
in a user's browser session in context of an affected site.

4) Input passed to various parameters in "usersL.php3"
is not sanitised, which can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.

5) A security issue where the installation script
"setup.php3" is not correctly removed after
installation, which can be exploited to disclose the
database password and other sensitive information.

The vulnerabilities have been reported in version
0.14.5. Prior versions may also be affected.

Solution:
Use another product.

Provided and/or discovered by:
1-4) HEX
5) sysbug

Additional information provided by:
Louis Wang, Fortinet Security Research Team, and Megasky.

Changelog:
2004-12-22: Added another vulnerability provided by
sysbug. Updated "Description" section.
2005-05-17: Added additional information provided by
Megasky. Updated "Description" section.
2005-12-05: Added additional information provided by
Louis Wang. Updated "Description" section.

Discussion

  • vlan7
    vlan7
    2006-04-25

    Logged In: YES
    user_id=1509746

    The first one can be fixed inserting this line at the
    beginning of the edituser.php file:

    if (isset($HTTP_POST_VARS["do_not_login"]))
    { exit(); }

    4-25-06 vlan7

     


Anonymous


Cancel   Add attachments