Live Chat (com_livechat) component 1.0 for Joomla! allows remote attackers to use the xmlhttp.php script as an open HTTP proxy to hide network scanning activities or scan internal networks via a GET request with a full URL in the query string.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/32803 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47305 | vdb entry |
https://www.exploit-db.com/exploits/7441 | exploit |