First published: Wed Mar 19 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the Freichat (com_freichat) component, possibly 9.4 and earlier, for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) xhash parameter to client/chat.php or (3) toname parameter to client/plugins/upload/upload.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Codologic CometChat | <=9.4 | |
Joomla | ||
All of | ||
Codologic CometChat | <=9.4 | |
Joomla |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5952 is classified as a high severity vulnerability due to its potential impact on user security through cross-site scripting.
To fix CVE-2013-5952, update the Freichat component to the latest version that is patched against XSS vulnerabilities.
CVE-2013-5952 can be exploited through the id or xhash parameters to client/chat.php and the toname parameter to client/plugins/upload/.
CVE-2013-5952 affects the Freichat versions up to and including 9.4.
Users of Joomla! running the vulnerable version of the Freichat component are at risk of being affected by CVE-2013-5952.