A cross-site scripting vulnerability is present in Xbtit 3.1. The stored XSS vulnerability occurs because /ajaxchat/sendChatData.php does not properly validate the value of the "n" (POST) parameter. Through this vulnerability, an attacker is capable to execute malicious JavaScript code.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/btiteam/xbtit-3.1 | third party advisory |
https://emaragkos.gr/infosec-adventures/xbtit-3-1-xss-stored-amp-reflected/ | third party advisory exploit |
https://github.com/btiteam/xbtit-3.1/issues/7 | third party advisory exploit |