Multiple cross-site request forgery (CSRF) vulnerabilities in Mibew Messenger 1.6.4 and earlier allow remote attackers to hijack the authentication of operators for requests that insert cross-site scripting (XSS) sequences via the (1) address or (2) threadid parameters to operator/ban.php; or (3) geolinkparams, (4) title, or (5) chattitle parameters to operator/settings.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/72822 | vdb entry |
http://secunia.com/advisories/47787 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/51723 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2012-01/0178.html | mailing list exploit |
http://www.openwall.com/lists/oss-security/2012/02/02/10 | mailing list |
http://www.codseq.it/advisories/mibew_messenger_multiple_xss | exploit |