Description
|
|
Multiple vulnerabilities have been identified in Ajax Chat, which may be exploited by remote attackers to execute arbitrary scripting code or gain knowledge of sensitive information.
The first flaw is due to an input validation error in the "includes/operator_chattranscript.php" script when processing the "chatid" parameter, which could be exploited by remote attackers to access and read the contents of certain files on a vulnerable system.
The second issue is due to an input validation error in the "visitor/livesupport/chat.php" script that does not validate the "userid" parameter, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
|