[原文]Multiple cross-site scripting (XSS) vulnerabilities in phpMyChat 0.14.6 allow remote attackers to inject arbitrary web script or HTML via the medium parameter to (1) start_page.css.php and (2) style.css.php; or the From parameter to users_popupL.php.
phpMyChat contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'medium' parameter upon submission to the 'start_page.css.php' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
The vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.
Louis Wang is credited with the discovery of this vulnerability.
phpHeaven phpMyChat 0.14.6
Nicholas Hoizey phpMyChat 0.14.5
phpMyChat is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
phpMyChat 0.14.5 is vulnerable; other versions may also be affected.
No exploit is required.
The following proof-of-concept URIs are available: