phpMyChat-Plus 1.98 is vulnerable to reflected XSS via JavaScript injection into the password reset URL. In the URL, the pmc_username parameter to pass_reset.php is vulnerable.
References
Link | Resource |
---|---|
http://ciprianmp.com/ | Vendor Advisory |
https://cinzinga.github.io/CVE-2019-19908/ | Third Party Advisory |
https://sourceforge.net/projects/phpmychat/ | Third Party Advisory |
http://ciprianmp.com/ | Vendor Advisory |
https://cinzinga.github.io/CVE-2019-19908/ | Third Party Advisory |
https://sourceforge.net/projects/phpmychat/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://ciprianmp.com/ - Vendor Advisory | |
References | () https://cinzinga.github.io/CVE-2019-19908/ - Third Party Advisory | |
References | () https://sourceforge.net/projects/phpmychat/ - Third Party Advisory |
Information
Published : 2019-12-20 13:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19908
Mitre link : CVE-2019-19908
CVE.ORG link : CVE-2019-19908
JSON object : View
Products Affected
ciprianmp
- phpmychat-plus
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')