Description
Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter.
Published: 2023-10-04
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-54351 Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter.
History

No history.

Subscriptions

Easy Chat Server Project Easy Chat Server
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2024-09-05T18:08:06.699Z

Reserved: 2023-08-23T09:39:43.847Z

Link: CVE-2023-4496

cve-icon Vulnrichment

Updated: 2024-08-02T07:31:05.530Z

cve-icon NVD

Status : Modified

Published: 2023-10-04T13:15:26.193

Modified: 2024-11-21T08:35:17.383

Link: CVE-2023-4496

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses